Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture

CSSLP 2019    |    Intermediate
  • 12 videos | 50m 29s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Explore security architecture considerations such as control identification and prioritization, distributed computing, cloud architectures, mobile applications, and hardware platform concerns in this 12-video course. First, learn to identify characteristics of control identification, or an organization's security controls in an enterprise setting and how to prioritize and enterprise's existing security controls. The course then examines the elements of distributed computing, a type of parallel computing in which software is divided into multiple tasks. Next, learners will explore service-oriented architecture, which is a collection of services that communicate with each other. You will learn about rich Internet web-based applications and pervasive computing, including the Internet of Things, wireless and sensor networks, embedded security architecture, cloud architectures, mobile app architectures, and hardware platforms. Finally, the course explores how an embedded system is designed to perform a specific operation as part of a larger hardware-based machine or system. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify characteristics of control identification and prioritization
    Recognize types of distributed computing such as client server, peer-to-peer, and message queuing
    Recognize elements of the service-oriented architecture such as enterprise service bus and web services
    List design considerations for rich internet applications such as client-side exploits or threats, remote code execution, and constant connectivity
    Describe pervasive computing including iot, wireless, location-based, rfid, near field communication, and sensor networks
  • List embedded security architecture considerations such as control systems and firmware
    Differentiate between different cloud architectures such as saas, paas, and iaas
    List components of mobile app architecture such as client hardware, client software, interfaces, endpoints, storage, and data transmission
    List typical security issues relating to mobile applications
    Describe hardware platform concerns
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 7s
  • 3m 22s
    In this video, you will identify characteristics of control identification and prioritization. FREE ACCESS
  • Locked
    3.  Distributed Computing
    5m 49s
    Upon completion of this video, you will be able to recognize types of distributed computing such as client-server, peer-to-peer, and message-queuing. FREE ACCESS
  • Locked
    4.  Service-oriented Architecture
    4m 35s
    Upon completion of this video, you will be able to recognize elements of the service-oriented architecture such as enterprise service bus and web services. FREE ACCESS
  • Locked
    5.  Rich Internet Applications
    4m 49s
    After completing this video, you will be able to list design considerations for rich Internet applications, such as client-side exploits or threats, remote code execution, and constant connectivity. FREE ACCESS
  • Locked
    6.  Pervasive Computing
    4m 18s
    Upon completion of this video, you will be able to describe pervasive computing including the Internet of Things, wireless, location-based, RFID, near field communication, and sensor networks. FREE ACCESS
  • Locked
    7.  Embedded Systems
    5m 22s
    Upon completion of this video, you will be able to list embedded security architecture considerations, such as control systems and firmware. FREE ACCESS
  • Locked
    8.  Cloud Architectures
    5m 9s
    Find out how to differentiate between different cloud architectures such as SaaS, PaaS, and IaaS. FREE ACCESS
  • Locked
    9.  Mobile Applications
    2m 59s
    Upon completion of this video, you will be able to list components of mobile app architecture such as client hardware, client software, interfaces, endpoints, storage, and data transmission. FREE ACCESS
  • Locked
    10.  Security Issues in Mobile Applications
    8m 35s
    After completing this video, you will be able to list typical security issues relating to mobile applications. FREE ACCESS
  • Locked
    11.  Hardware Platform Concerns
    2m 14s
    After completing this video, you will be able to describe hardware platform concerns. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 9s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.6 of 498 users Rating 4.6 of 498 users (498)
Rating 4.5 of 22 users Rating 4.5 of 22 users (22)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 118 users Rating 4.6 of 118 users (118)
Rating 4.4 of 281 users Rating 4.4 of 281 users (281)
Rating 4.4 of 44 users Rating 4.4 of 44 users (44)