Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts

CSSLP 2019    |    Expert
  • 9 videos | 24m 33s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 559 users Rating 4.6 of 559 users (559)
This course examines information needed to earn the (ISC)2 CSSLP (Certified Secure Software Lifecycle Professional) certification and to prepare for the CSSLP exam. These security professionals are well versed in how to incorporate key security practices into all lifecycle stages of software development. This course covers secure software concepts such as covert, overt, and encryption. You will examine the secure software concepts of confidentiality, integrity, and availability (collectively, CIA) and examine concepts that support the concepts, such as authentication, authorization, accountability, and non-repudiation. Learn the difference between various integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity. You will also learn about authentication concepts, such as multifactor authentication, identity and access management, single sign-on, and federated identity management. Learn when to use different authorization concepts, such as access controls and entitlements. Finally, the course covers accountability concepts, such as auditing and logging, and describe non-repudiation concepts, such as public key infrastructure (PKI) and digital signatures.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize confidentiality concepts such as covert, overt, and encryption
    Differentiate between different integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity
    Describe different availability concepts such as failover, replication, clustering, scalability, and resiliency
    Recognize available authentication concepts such as multifactor authentication, identity and access management, single sign-on, and federated identity
  • Differentiate between authorization concepts such as access controls and entitlements
    List accountability concepts such as auditing and logging
    Describe non-repudiation concepts such as pki and digital signatures
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 6s
  • 3m 19s
    After completing this video, you will be able to recognize confidentiality concepts such as covert, overt, and encryption. FREE ACCESS
  • Locked
    3.  Integrity
    3m 7s
    Find out how to differentiate between different integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity. FREE ACCESS
  • Locked
    4.  Availability
    3m 35s
    Upon completion of this video, you will be able to describe different availability concepts such as failover, replication, clustering, scalability, and resiliency. FREE ACCESS
  • Locked
    5.  Authentication
    2m 52s
    After completing this video, you will be able to recognize available authentication concepts such as multifactor authentication, identity and access management, single sign-on, and federated identity. FREE ACCESS
  • Locked
    6.  Authorization
    3m 30s
    Learn how to differentiate between authorization concepts such as access controls and entitlements. FREE ACCESS
  • Locked
    7.  Accountability
    2m 12s
    After completing this video, you will be able to list accountability concepts such as auditing and logging. FREE ACCESS
  • Locked
    8.  Non-repudiation
    2m 38s
    Upon completion of this video, you will be able to describe non-repudiation concepts such as PKI and digital signatures. FREE ACCESS
  • Locked
    9.  Course Summary
    1m 14s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 118 users Rating 4.6 of 118 users (118)
Rating 4.5 of 280 users Rating 4.5 of 280 users (280)
Rating 4.5 of 85 users Rating 4.5 of 85 users (85)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 439 users Rating 4.5 of 439 users (439)
Rating 4.5 of 280 users Rating 4.5 of 280 users (280)
Rating 4.4 of 32 users Rating 4.4 of 32 users (32)