Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
CSSLP 2019
| Intermediate
- 12 videos | 50m 29s
- Includes Assessment
- Earns a Badge
Explore security architecture considerations such as control identification and prioritization, distributed computing, cloud architectures, mobile applications, and hardware platform concerns in this 12-video course. First, learn to identify characteristics of control identification, or an organization's security controls in an enterprise setting and how to prioritize and enterprise's existing security controls. The course then examines the elements of distributed computing, a type of parallel computing in which software is divided into multiple tasks. Next, learners will explore service-oriented architecture, which is a collection of services that communicate with each other. You will learn about rich Internet web-based applications and pervasive computing, including the Internet of Things, wireless and sensor networks, embedded security architecture, cloud architectures, mobile app architectures, and hardware platforms. Finally, the course explores how an embedded system is designed to perform a specific operation as part of a larger hardware-based machine or system. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify characteristics of control identification and prioritizationRecognize types of distributed computing such as client server, peer-to-peer, and message queuingRecognize elements of the service-oriented architecture such as enterprise service bus and web servicesList design considerations for rich internet applications such as client-side exploits or threats, remote code execution, and constant connectivityDescribe pervasive computing including iot, wireless, location-based, rfid, near field communication, and sensor networks
-
List embedded security architecture considerations such as control systems and firmwareDifferentiate between different cloud architectures such as saas, paas, and iaasList components of mobile app architecture such as client hardware, client software, interfaces, endpoints, storage, and data transmissionList typical security issues relating to mobile applicationsDescribe hardware platform concernsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 7s
-
3m 22sIn this video, you will identify characteristics of control identification and prioritization. FREE ACCESS
-
5m 49sUpon completion of this video, you will be able to recognize types of distributed computing such as client-server, peer-to-peer, and message-queuing. FREE ACCESS
-
4m 35sUpon completion of this video, you will be able to recognize elements of the service-oriented architecture such as enterprise service bus and web services. FREE ACCESS
-
4m 49sAfter completing this video, you will be able to list design considerations for rich Internet applications, such as client-side exploits or threats, remote code execution, and constant connectivity. FREE ACCESS
-
4m 18sUpon completion of this video, you will be able to describe pervasive computing including the Internet of Things, wireless, location-based, RFID, near field communication, and sensor networks. FREE ACCESS
-
5m 22sUpon completion of this video, you will be able to list embedded security architecture considerations, such as control systems and firmware. FREE ACCESS
-
5m 9sFind out how to differentiate between different cloud architectures such as SaaS, PaaS, and IaaS. FREE ACCESS
-
2m 59sUpon completion of this video, you will be able to list components of mobile app architecture such as client hardware, client software, interfaces, endpoints, storage, and data transmission. FREE ACCESS
-
8m 35sAfter completing this video, you will be able to list typical security issues relating to mobile applications. FREE ACCESS
-
2m 14sAfter completing this video, you will be able to describe hardware platform concerns. FREE ACCESS
-
1m 9s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.