Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies
CSSLP 2019
| Intermediate
- 13 videos | 1h 1m 32s
- Includes Assessment
- Earns a Badge
In this 13-video course, learners can explore best practices for securing commonly used architecture and technologies such as virtualization, databases, and the programming language environment. First, learn the three steps involved in authentication and identity management. Next, earn the principles of Credential Management and protecting credentials used for authentication, including passwords, tokens, biometrics, and certificates. Learners will then examine logging or recording a user's actions within a system, and data flow control methods. Next, learn about data loss prevention as an in-depth security strategy that encompasses many different technologies. Learn how virtualization allows for software to be hosted in a virtual environment. Learners will then examine digit rights management (DMR), which restricts access to content that is not local to secure digital content, and protect intellectual property. Finally, the course explores the basis of trusted computing-the hardware, software, and firmware components critical to securing a system which includes discussion of programming language and operating systems. This course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDistinguish between characteristics of authentication and identity managementRecognize characteristics of credential managementDistinguish between flow control methodsRecognize characteristics of loggingRecognize characteristics of data loss preventionIdentify benefits of virtualization in secure software design
-
Recognize types of rights expression languages in digital rights managementRecognize characteristics of trusted computingDistinguish between database security techniquesDistinguish between compilers, interpreters, and hybrid source codesRecognize characteristics of operating systemsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 50s
-
7m 22sIn this video, learn how to distinguish between characteristics of authentication and identity management. FREE ACCESS
-
5m 48sAfter completing this video, you will be able to recognize characteristics of credential management. FREE ACCESS
-
5m 10sIn this video, you will learn how to distinguish between flow control methods. FREE ACCESS
-
4m 34sUpon completion of this video, you will be able to recognize characteristics of logs. FREE ACCESS
-
5m 3sUpon completion of this video, you will be able to recognize characteristics of data loss prevention. FREE ACCESS
-
5m 9sFind out how to identify benefits of virtualization in secure software design. FREE ACCESS
-
3m 47sUpon completion of this video, you will be able to recognize types of rights expression languages used in digital rights management. FREE ACCESS
-
6m 10sUpon completion of this video, you will be able to recognize characteristics of trusted computing. FREE ACCESS
-
4m 57sFind out how to distinguish between different database security techniques. FREE ACCESS
-
6m 51sLearn how to distinguish between compilers, interpreters, and hybrid source code. FREE ACCESS
-
3m 32sAfter completing this video, you will be able to recognize characteristics of operating systems. FREE ACCESS
-
1m 19s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.YOU MIGHT ALSO LIKE
Course
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
Rating 4.5 of 46 users
(46)
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course
Certified Secure Software Lifecycle Professional (CSSLP) 2019: Software Deployment & Management
Rating 4.5 of 46 users
(46)