CISSP 2021: Architecture, Design, & Solutions Vulnerabilities

CISSP    |    Expert
  • 12 videos | 51m 38s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 45 users Rating 4.5 of 45 users (45)
A security professional needs to be acquainted with security architecture and engineering as they determine the design, implementation, monitoring, and securing of systems and networks of an organization. Use this course to explore the fundamentals of security architecture and engineering. Learn more about client-server, databases, and distributed systems, examine IoT, containers, serverless, and microservices, and explore embedded system security and constraints in detail. You'll also get familiar with TPM, HPC, and edge computing security. Upon completion of this course, you'll be able to assess and mitigate the vulnerabilities of modern security architectures, designs, and solutions, as well as understanding the capabilities of securing information systems. Further, you can also use this course to prepare for the CISSP exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare security between clients-based systems and server-based systems
    Identify the distinctiveness of securing database systems, including scoping, tailoring, tokenizing, and abstraction
    Recognize the security of industrial control systems and supervisory control and data acquisition (scada)
    Describe the security of virtualization and cloud-based deployments, such as iaas, paas, saas, mssps, and casbs
    Outline the characteristics of securing distributed systems
  • Recognize the main vulnerabilities to iot based on the open web application security project (owasp)
    Compare the security distinctiveness of securing containerized applications, both server-based and serverless, and microservices
    Describe the unique aspects of securing embedded systems and soc deployments
    Assess the security capabilities of information systems (memory protection, tpm, encryption/decryption)
    Describe security of high-performance computing (hpc) systems and edge computing systems
    Summarize the key concepts covered in this course

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.6 of 212 users Rating 4.6 of 212 users (212)
Rating 4.5 of 128 users Rating 4.5 of 128 users (128)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 42 users Rating 4.5 of 42 users (42)
Rating 4.6 of 64 users Rating 4.6 of 64 users (64)
Rating 4.5 of 292 users Rating 4.5 of 292 users (292)