AGENDA
Implementation and operation of the controls necessary to insure availability, integrity, and confidentiality of information
Know how to secure an enterprise architecture
Relationships between various types of software
Design principles of enterprise architecture
Physical components of IT architecture
Security models and architecture theory
Evaluation methods and criteria
Definitions of certification and accreditation
Difference between trusted and nontrusted components
Constitutes appropriate protection mechanisms
Purpose of assurance evaluations
Techniques used to provide system security