Enterprise Security Architecture
You are here: Home \ Enterprise Security Architecture
Enterprise Security Architecture
Enterprise Security Architecture

Note that this course is temporarily unavailable.

Enterprise Security Architecture (ESA) Fundamentals

Learn how to turn security risks into business opportunities.

The Enterprise Security Architecture (ESA) Fundamentals course is unique because it doesn’t focus on technology alone. It also teaches you how to integrate your organization’s business objectives into your overall security plan. Great Enterprise Security Architecture protects organizations without limiting business performance — and that’s what this course will help you achieve.
The curriculum is an adaptation of the world’s best security practices and frameworks, including SABSA, TOGAF, ISO 27000 series, COBIT, NIST, and PCI-DSS.

Why You Should Take This Course

Not only can this course teach you essential skills that can protect your critical information, they can also assure your organization’s ability to conduct business on a daily basis. It includes three days of instructor-led classroom-based training (24 CPEs). Upon successful completion, you will be awarded an Enterprise Security Architecture Fundamentals Certificate of Completion.
This course is ideal for security and risk management professionals, architects, IT and network practitioners, and executives wishing to gain a greater understanding of building a business-driven security program.


Learning Objectives

  • Understand what architectural frameworks and standards exist
  • Understand how ESA integrates with current business and IT standards and practices
  • Understand how ESA methods assure business value and create new opportunities
  • Learn the fundamentals of risk management for enterprise & systems assurance
  • Learn how to assess and model critical business relationships and trust relationships
  • Learn how to create effective Security Program Governance
  • Learn techniques used to define security services and solution architectures
  • Understand how an ESA can assure long term enterprise success and resiliency


Module 1: Enterprise Security Architecture and Best Practices

Module 2: ESA & Architectural Life-cycles

Module 3: Taking a Business Driven Approach

Module 4: Introduction to Risk Modelling for Architecture

Module 5: Assessing Business Relationships and Modelling Trust

Module 6: Defining Effective Security Program Governance

Module 7: Developing an Enterprise Security Roadmap

Module 8: Defining Security Services Architecture

Module 9: Traceable and Justified Designs

Module 10: Bringing it all together

Why Above Security?

Above Security has been teaching Enterprise Security Architecture and Security Practitioner courses for over 10 years. As part of our consulting practice, Above Security has integrated best practices from Enterprise Security Architecture, IT Architecture, Security Best Practices, and IT Service Management practice to build world-class security architectures for organizations across all industry sectors and across the globe.

For more information on this course or upcoming classes, please see our Courses Catalogue.

Attendee Comments From a Previous ESA Presentation

  • “I enjoyed the practical applications of the content. [The instructor] is highly knowledgeable and specific in details.” —James Myers, Security & Risk Management Professional
  • “A ton of info…but it was easy to understand and digest.” — Cory Mathews, Computer & Network Security Professional
  • “Excellent concepts that are beneficial for real-time discussions with clients.” — Naveen Krishnan, Whitley Penn Financial
  • “Fantastic course.” — Scott Geye, Whitley Penn Financial
  • “Excellent!” —David Hernandez, Whitley Penn Financial
  • “Great material.” — James Munoz, Information Technology Executive
  • “Awesome course.” — Nitin Salvi, Information Security Architect

Above Security was recognized by CIO Review Magazine as one the of the 20 most promising enterprise security consulting companies worldwide

Talk To An IT Security Expert

Contact Us

Read Our Security Case Studies

Case Studies

Download Our Services Whitepapers

Download Whitepaper