8 hours 39 minutes
so looking at the frameworks, we're now gonna build our architecture. So in this section,
here's where the hardware, the software, the firmware and that's what those acronyms hardware software for where Stand for Smeaton, the business objective. And with that architecture because it describes the inner operation
of all of those elements of our environment, we have to make sure that they work well together. So it's not enough just to signify that a device where mechanism works doesn't work in my environment.
Consistent. We have to think about scale, ability. Can we grow in the future? Do we have the environment in place so that if we
take on another organization, if we hire 200 people, we have a huge boost in sales? Can we handle it?
Can we? If we're not immediately there, can we upgrade the equipment that we have? Can we bring in additional elements? Can we meet our needs? Right? Can the architecture Vern buyer environment not hold us back from implementing our goals is really kind of what we're saying here.
So when we talk about architecture, we could talk about business architecture, right, The elements of strategy and governance and organization processes with. We've really kind of addressed those starting with governance
data architecture, er, making sure that how we store process manage our data
is following and accomplishing our objectives. Application architecture er, Are we designing APS within our framework? Are we are we testing and implementing
and then the technology offer architecture? You see that common theme with our architectures, how it comes together to support the strategy,
the goals, how to meet the objectives.
So we talk about an information security framework,
organizational components, management components, administrative components and educational, not organizational operational. So when we say operational, there's Day today controls that we implement,
fitting in with management, fitting in with those administrative controls, policies and so on. And then we train our people.
So when we look ATT, operational components,
something that's very big that's gonna be on this exam's gonna be in a lot of other exams. Identity and access managed.
How we deal with,
Cybrary's Certified Information Security Manager (CISM) course is a great fit for IT professionals looking to move up in their organization and advance their careers and/or current CISMs looking to learn about the latest trends in the IT industry.