CSSLP 2024: Digital Certificates, Firewalls, Hypervisors, & Containers

CSSLP 2024    |    Expert
  • 14 videos | 1h 47m 26s
  • Earns a Badge
Critical aspects of the internet are powered by a few keystone protocols and technologies including digital certificates, firewalls, virtual machine hypervisors, and containers. In this course, you will learn about the X.509 standard for digital certificates, which are used to secure communications across various applications such as web browsers, email, VPNs, single sign-on (SSO), and code signing. Explore flow control techniques and the role of proxy servers in managing data flow and load balancing, as well as the critical function of firewalls in network security. Discover data loss prevention (DLP) strategies and the role of queuing in flow control. Next, learn about Infrastructure as Code (IaC), virtualization, virtual machines (VMs), bare metal servers, and Type 1 (bare-metal) and Type 2 (hosted) hypervisors. Finally, you'll be introduced to containers, container security considerations, and trusted computing techniques like secure and measured boot, remote attestation, sealed storage, and memory curtaining. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Describe the x.509 standard for digital certificates and its uses in web browsers, email, vpn, single sign-on (sso), and code signing
    Define flow control and enumerate flow control techniques, and analyze forward and reverse proxy servers for flow control and load balancing
    Identify the uses of firewalls, including for flow control, and enumerate protocols that feature flow control
    Define data loss prevention (dlp) for endpoint, email, cloud, and network data and discuss queuing for flow control
    Define infrastructure as code and analyze its benefits
    Discuss virtualization and outline its many benefits
  • Compare virtual machines and bare metal hardware as compute options
    Describe hypervisors and contrast type 1 and type 2 hypervisors
    Describe containers and their attributes and benefits relative to virtual machines
    Identify standards that apply to container security such as cis docker benchmark, iso/iec 27001/02, and nist sp 800-190
    Outline practices in trusted computing such as secure and measured boot, remote attestation, sealed storage, and memory curtaining
    Analyze uses and features of trusted platform modules and elements of the trusted compute base (tcb)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 19s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 11m 8s
    In this video, we will describe the X.509 standard for digital certificates and its uses in web browsers, email, VPN, single sign-on (SSO), and code signing. FREE ACCESS
  • Locked
    3.  Proxy Servers for Flow Control and Load Balancing
    8m 49s
    Upon completion of this video, you will be able to define flow control and enumerate flow control techniques, and analyze forward and reverse proxy servers for flow control and load balancing. FREE ACCESS
  • Locked
    4.  Firewalls and Flow Control Protocols
    8m 59s
    After completing this video, you will be able to identify the uses of firewalls, including for flow control, and enumerate protocols that feature flow control. FREE ACCESS
  • Locked
    5.  Data Loss Prevention (DLP)
    10m 23s
    In this video, we will define data loss prevention (DLP) for endpoint, email, cloud, and network data and discuss queuing for flow control. FREE ACCESS
  • Locked
    6.  Infrastructure as Code (IaC)
    5m 54s
    In this video, learn how to define Infrastructure as Code and analyze its benefits. FREE ACCESS
  • Locked
    7.  The Benefits of Virtualization
    6m 23s
    During this video, you will learn how to discuss virtualization and outline its many benefits. FREE ACCESS
  • Locked
    8.  Virtual Machines vs. Bare Metal
    10m 32s
    After completing this video, you will be able to compare virtual machines and bare metal hardware as compute options. FREE ACCESS
  • Locked
    9.  Hypervisors in VM Instances
    7m 1s
    Upon completion of this video, you will be able to describe hypervisors and contrast Type 1 and Type 2 hypervisors. FREE ACCESS
  • Locked
    10.  Containers
    10m 20s
    In this video, we will describe containers and their attributes and benefits relative to virtual machines. FREE ACCESS
  • Locked
    11.  Container Security Considerations and Standards
    9m 6s
    During this video, you will learn how to identify standards that apply to container security such as CIS Docker benchmark, ISO/IEC 27001/02, and NIST SP 800-190. FREE ACCESS
  • Locked
    12.  Trusted Computing
    6m 27s
    After completing this video, you will be able to outline practices in trusted computing such as secure and measured boot, remote attestation, sealed storage, and memory curtaining. FREE ACCESS
  • Locked
    13.  Trusted Platform Modules and Trusted Compute Base
    7m 39s
    Upon completion of this video, you will be able to analyze uses and features of Trusted Platform Modules and elements of the Trusted Compute Base (TCB). FREE ACCESS
  • Locked
    14.  Course Summary
    2m 27s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 16 users Rating 4.8 of 16 users (16)
Rating 4.2 of 6 users Rating 4.2 of 6 users (6)
Rating 4.5 of 12 users Rating 4.5 of 12 users (12)