- Learning Path Libraries: This path is only available in the libraries listed. To access this path, purchase a license for the corresponding library.
- Core Tech
Security Architect | Work Role ID: 652 (NIST: DD-WRL-001)
A **security architect** designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
This path will get you started on your journey to becoming a security architect! Begin with the fundamental concepts of network protocols and security engineering through hands-on labs, dive into the essential skills necessary to perform the day-to-day functions of data management and then expand your skill set with, automation, deeper/advanced concepts and additional knowledge from adjacent roles!
This path aligns to the Knowledge, Skills, Abilities and Tasks (KSAs) within the **Workforce Framework for Cybersecurity (CSWF)** and the **DoD Cyber Workforce Framework (DCWF)** for the work role of:
**Security Architect** Work Role 652 or DD-WRL-001
Content in this path
Fundamentals
Begin your learning journey with the fundamental concepts of network protocols and data management through hands-on labs and courses!
Skill Essentials
Now that you know the fundamentals, dive into the essential skills necessary to perform the day-to-day functions of a security architect including security engineering and endpoint security.
Expanded Skillset
It's time to expand your skill set with tools, and more advanced concepts! This section gives you a brief introduction into many, additional skills that you will find helpful as a security architect. We have full training paths on all of these skills; see the Supplemental Skill Paths section to learn more.
Adjacent Skill Knowledge
Now that you've mastered all the skills for a security architect, learn about additional cyber roles and their responsibilities.
- Zero Trust Architecture (ZTA)
- Vulnerability Analysis
- Information Security Testing and Auditing with Nmap
- Python for Cyber Defense
- Pen Testing
- Security Engineering
- Breaking News: Vulnerabilities, Exploits and Breaches
- None
- cswf
- dcwf
- nice framework
- Security Architect
- IAM