Course Description

Artistic image of a transparent grey lock with a holographic blue and purple representation of a network

Understanding how data travels from an attacker’s system to your corporate or home network is critical. Many successful attacks occur due to misconfigured devices, such as routers or firewalls.

The Security Architecture and Controls course provides a comprehensive understanding of how data travels across the Internet and through your network. You will analyze the path packets take, along with devices that can be used to minimize risk and provide a defense-in-depth posture. This course’s primary objective is to provide an understanding of architecture design and security controls that can be applied to reduce risk to enterprise environments.

Course Outline

This is an 18-hour course.

  • Perimeter Security Fundamentals
  • Packet Filtering
  • Stateful Firewalls and Proxy Firewalls
  • The Role of a Router
  • Network Intrusion Detection
  • Virtual Private Networks
  • Host Hardening

Learner Outcomes

At the end of this course, you will be able to:

  • Understand the major types of controls
  • Implement packet filtering, proxy firewalls and stateful firewalls
  • Identify security risks and design strategies to protect against intruders
  • Identify different types of hacker activities and the security policies necessary to prevent hacker penetration
  • Establish an effective security policy
  • Understand the different phases of a security audit


Learn about more cybersecurity topics here


This course is recommended for new developers and IT security professionals. It applies toward the Cybersecurity Essentials certificate.

Applies Towards the Following Certificates

Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .