CISSP 2024: Vulnerabilities of Architectures, Designs, & Solution Elements
CISSP 2024
| Expert
- 14 videos | 55m 36s
- Includes Assessment
- Earns a Badge
A security vulnerability is a weakness, flaw, or error found within a security element that has the potential to be leveraged by a threat agent in order to compromise a secure network, system, or application. The goal of this course is to prepare the CISSP candidate to assess and mitigate the vulnerabilities of security architectures, designs, and solution elements. In this course, you will begin by considering the potential vulnerabilities of various systems including client-based, server-based, database, cryptographic, industrial control (ICS), embedded, virtualized, cloud-based, and distributed systems and how you might mitigate these issues. Next, you will walk through ways to lessen vulnerabilities in Internet of Things (IoT) devices and discover how to assess and mitigate vulnerabilities in containerized systems and microservices including application programming interface (API) calls. You will also look at the potential weaknesses in serverless technologies, high-performance computing, and edge computing and how to alleviate these issues. Finally, you will explore the security capabilities of Information Systems like memory protection, Trusted Platform Module (TPM), and encryption/decryption.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline how to assess and mitigate the vulnerabilities of client-based and server-based systemsProvide an overview of how to assess and mitigate the vulnerabilities of database systemsOutline how to assess and mitigate the vulnerabilities of cryptographic systemsOutline how to assess and mitigate the vulnerabilities of industrial control systems (ics) and specialty embedded systemsIdentify how to assess and mitigate the vulnerabilities of virtualized and cloud-based services such as iaas, paas, and saasRecognize how to assess and mitigate the vulnerabilities of distributed systems
-
Assess and mitigate the vulnerabilities of internet of things (iot)Recognize how to assess and mitigate the vulnerabilities of containerized systems and microservices including application programming interface (api) callsOutline how to assess and mitigate the vulnerabilities of serverless technologiesRecognize how to assess and mitigate the vulnerabilities of high-performance computing systemsIdentify how to assess and mitigate the vulnerabilities of edge computing systemsRecognize security capabilities of information systems like memory protection, trusted platform module (tpm), and encryption/decryptionSummarize the key concepts covered in this course
IN THIS COURSE
-
56sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 15sAfter completing this video, you will be able to outline how to assess and mitigate the vulnerabilities of client-based and server-based systems. FREE ACCESS
-
3m 17sUpon completion of this video, you will be able to provide an overview of how to assess and mitigate the vulnerabilities of database systems. FREE ACCESS
-
3m 56sAfter completing this video, you will be able to outline how to assess and mitigate the vulnerabilities of cryptographic systems. FREE ACCESS
-
3m 34sUpon completion of this video, you will be able to outline how to assess and mitigate the vulnerabilities of Industrial Control Systems (ICS) and specialty embedded systems. FREE ACCESS
-
7m 43sAfter completing this video, you will be able to identify how to assess and mitigate the vulnerabilities of virtualized and cloud-based services such as IaaS, PaaS, and SaaS. FREE ACCESS
-
4m 15sUpon completion of this video, you will be able to recognize how to assess and mitigate the vulnerabilities of distributed systems. FREE ACCESS
-
4m 13sFind out how to assess and mitigate the vulnerabilities of Internet of Things (IoT). FREE ACCESS
-
4m 16sAfter completing this video, you will be able to recognize how to assess and mitigate the vulnerabilities of containerized systems and microservices including application programming interface (API) calls. FREE ACCESS
-
3m 38sUpon completion of this video, you will be able to outline how to assess and mitigate the vulnerabilities of serverless technologies. FREE ACCESS
-
3m 49sAfter completing this video, you will be able to recognize how to assess and mitigate the vulnerabilities of high-performance computing systems. FREE ACCESS
-
4m 36sUpon completion of this video, you will be able to identify how to assess and mitigate the vulnerabilities of edge computing systems. FREE ACCESS
-
3m 13sAfter completing this video, you will be able to recognize security capabilities of Information Systems like memory protection, Trusted Platform Module (TPM), and encryption/decryption. FREE ACCESS
-
56sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.