CISSP 2024: Vulnerabilities of Architectures, Designs, & Solution Elements

CISSP 2024    |    Expert
  • 14 videos | 55m 36s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
A security vulnerability is a weakness, flaw, or error found within a security element that has the potential to be leveraged by a threat agent in order to compromise a secure network, system, or application. The goal of this course is to prepare the CISSP candidate to assess and mitigate the vulnerabilities of security architectures, designs, and solution elements. In this course, you will begin by considering the potential vulnerabilities of various systems including client-based, server-based, database, cryptographic, industrial control (ICS), embedded, virtualized, cloud-based, and distributed systems and how you might mitigate these issues. Next, you will walk through ways to lessen vulnerabilities in Internet of Things (IoT) devices and discover how to assess and mitigate vulnerabilities in containerized systems and microservices including application programming interface (API) calls. You will also look at the potential weaknesses in serverless technologies, high-performance computing, and edge computing and how to alleviate these issues. Finally, you will explore the security capabilities of Information Systems like memory protection, Trusted Platform Module (TPM), and encryption/decryption.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Outline how to assess and mitigate the vulnerabilities of client-based and server-based systems
    Provide an overview of how to assess and mitigate the vulnerabilities of database systems
    Outline how to assess and mitigate the vulnerabilities of cryptographic systems
    Outline how to assess and mitigate the vulnerabilities of industrial control systems (ics) and specialty embedded systems
    Identify how to assess and mitigate the vulnerabilities of virtualized and cloud-based services such as iaas, paas, and saas
    Recognize how to assess and mitigate the vulnerabilities of distributed systems
  • Assess and mitigate the vulnerabilities of internet of things (iot)
    Recognize how to assess and mitigate the vulnerabilities of containerized systems and microservices including application programming interface (api) calls
    Outline how to assess and mitigate the vulnerabilities of serverless technologies
    Recognize how to assess and mitigate the vulnerabilities of high-performance computing systems
    Identify how to assess and mitigate the vulnerabilities of edge computing systems
    Recognize security capabilities of information systems like memory protection, trusted platform module (tpm), and encryption/decryption
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 56s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 15s
    After completing this video, you will be able to outline how to assess and mitigate the vulnerabilities of client-based and server-based systems. FREE ACCESS
  • Locked
    3.  Database Systems
    3m 17s
    Upon completion of this video, you will be able to provide an overview of how to assess and mitigate the vulnerabilities of database systems. FREE ACCESS
  • Locked
    4.  Cryptographic Systems
    3m 56s
    After completing this video, you will be able to outline how to assess and mitigate the vulnerabilities of cryptographic systems. FREE ACCESS
  • Locked
    5.  Industrial Control Systems (ICS) and Embedded Systems
    3m 34s
    Upon completion of this video, you will be able to outline how to assess and mitigate the vulnerabilities of Industrial Control Systems (ICS) and specialty embedded systems. FREE ACCESS
  • Locked
    6.  Virtualized and Cloud-based Systems
    7m 43s
    After completing this video, you will be able to identify how to assess and mitigate the vulnerabilities of virtualized and cloud-based services such as IaaS, PaaS, and SaaS. FREE ACCESS
  • Locked
    7.  Distributed Systems
    4m 15s
    Upon completion of this video, you will be able to recognize how to assess and mitigate the vulnerabilities of distributed systems. FREE ACCESS
  • Locked
    8.  Assessing Internet of Things (IoT) Vulnerabilities
    4m 13s
    Find out how to assess and mitigate the vulnerabilities of Internet of Things (IoT). FREE ACCESS
  • Locked
    9.  Containerization and Microservices
    4m 16s
    After completing this video, you will be able to recognize how to assess and mitigate the vulnerabilities of containerized systems and microservices including application programming interface (API) calls. FREE ACCESS
  • Locked
    10.  Serverless Technologies
    3m 38s
    Upon completion of this video, you will be able to outline how to assess and mitigate the vulnerabilities of serverless technologies. FREE ACCESS
  • Locked
    11.  High-performance Computing
    3m 49s
    After completing this video, you will be able to recognize how to assess and mitigate the vulnerabilities of high-performance computing systems. FREE ACCESS
  • Locked
    12.  Edge Computing
    4m 36s
    Upon completion of this video, you will be able to identify how to assess and mitigate the vulnerabilities of edge computing systems. FREE ACCESS
  • Locked
    13.  Trusted Execution Environments
    3m 13s
    After completing this video, you will be able to recognize security capabilities of Information Systems like memory protection, Trusted Platform Module (TPM), and encryption/decryption. FREE ACCESS
  • Locked
    14.  Course Summary
    56s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.9 of 24 users Rating 4.9 of 24 users (24)
Rating 4.8 of 77 users Rating 4.8 of 77 users (77)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)