Certified Secure Software Lifecycle Professional (CSSLP) 2019: Core Concepts
CSSLP 2019
| Expert
- 9 videos | 24m 33s
- Includes Assessment
- Earns a Badge
This course examines information needed to earn the (ISC)2 CSSLP (Certified Secure Software Lifecycle Professional) certification and to prepare for the CSSLP exam. These security professionals are well versed in how to incorporate key security practices into all lifecycle stages of software development. This course covers secure software concepts such as covert, overt, and encryption. You will examine the secure software concepts of confidentiality, integrity, and availability (collectively, CIA) and examine concepts that support the concepts, such as authentication, authorization, accountability, and non-repudiation. Learn the difference between various integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity. You will also learn about authentication concepts, such as multifactor authentication, identity and access management, single sign-on, and federated identity management. Learn when to use different authorization concepts, such as access controls and entitlements. Finally, the course covers accountability concepts, such as auditing and logging, and describe non-repudiation concepts, such as public key infrastructure (PKI) and digital signatures.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize confidentiality concepts such as covert, overt, and encryptionDifferentiate between different integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticityDescribe different availability concepts such as failover, replication, clustering, scalability, and resiliencyRecognize available authentication concepts such as multifactor authentication, identity and access management, single sign-on, and federated identity
-
Differentiate between authorization concepts such as access controls and entitlementsList accountability concepts such as auditing and loggingDescribe non-repudiation concepts such as pki and digital signaturesSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 6s
-
3m 19sAfter completing this video, you will be able to recognize confidentiality concepts such as covert, overt, and encryption. FREE ACCESS
-
3m 7sFind out how to differentiate between different integrity concepts such as hashing, digital signatures, code signing, reliability, alterations, and authenticity. FREE ACCESS
-
3m 35sUpon completion of this video, you will be able to describe different availability concepts such as failover, replication, clustering, scalability, and resiliency. FREE ACCESS
-
2m 52sAfter completing this video, you will be able to recognize available authentication concepts such as multifactor authentication, identity and access management, single sign-on, and federated identity. FREE ACCESS
-
3m 30sLearn how to differentiate between authorization concepts such as access controls and entitlements. FREE ACCESS
-
2m 12sAfter completing this video, you will be able to list accountability concepts such as auditing and logging. FREE ACCESS
-
2m 38sUpon completion of this video, you will be able to describe non-repudiation concepts such as PKI and digital signatures. FREE ACCESS
-
1m 14s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.