CSSLP 2024: Digital Certificates, Firewalls, Hypervisors, & Containers
CSSLP 2024
| Expert
- 14 videos | 1h 47m 26s
- Includes Assessment
- Earns a Badge
Critical aspects of the internet are powered by a few keystone protocols and technologies including digital certificates, firewalls, virtual machine hypervisors, and containers. In this course, you will learn about the X.509 standard for digital certificates, which are used to secure communications across various applications such as web browsers, email, VPNs, single sign-on (SSO), and code signing. Explore flow control techniques and the role of proxy servers in managing data flow and load balancing, as well as the critical function of firewalls in network security. Discover data loss prevention (DLP) strategies and the role of queuing in flow control. Next, learn about Infrastructure as Code (IaC), virtualization, virtual machines (VMs), bare metal servers, and Type 1 (bare metal) and Type 2 (hosted) hypervisors. Finally, you'll be introduced to containers, container security considerations, and trusted computing techniques like secure and measured boot, remote attestation, sealed storage, and memory curtaining. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe the x.509 standard for digital certificates and its uses in web browsers, email, vpn, single sign-on (sso), and code signingDefine flow control and enumerate flow control techniques, and analyze forward and reverse proxy servers for flow control and load balancingIdentify the uses of firewalls, including for flow control, and enumerate protocols that feature flow controlDefine data loss prevention (dlp) for endpoint, email, cloud, and network data and discuss queuing for flow controlDefine infrastructure as code and analyze its benefitsDiscuss virtualization and outline its many benefits
-
Compare virtual machines and bare metal hardware as compute optionsDescribe hypervisors and contrast type 1 and type 2 hypervisorsDescribe containers and their attributes and benefits relative to virtual machinesIdentify standards that apply to container security such as cis docker benchmark, iso/iec 27001/02, and nist sp 800-190Outline practices in trusted computing such as secure and measured boot, remote attestation, sealed storage, and memory curtainingAnalyze uses and features of trusted platform modules and elements of the trusted compute base (tcb)Summarize the key concepts covered in this course
IN THIS COURSE
-
2m 19sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
11m 8sIn this video, we will describe the X.509 standard for digital certificates and its uses in web browsers, email, VPN, single sign-on (SSO), and code signing. FREE ACCESS
-
8m 49sUpon completion of this video, you will be able to define flow control and enumerate flow control techniques, and analyze forward and reverse proxy servers for flow control and load balancing. FREE ACCESS
-
8m 59sAfter completing this video, you will be able to identify the uses of firewalls, including for flow control, and enumerate protocols that feature flow control. FREE ACCESS
-
10m 23sIn this video, we will define data loss prevention (DLP) for endpoint, email, cloud, and network data and discuss queuing for flow control. FREE ACCESS
-
5m 54sIn this video, learn how to define Infrastructure as Code and analyze its benefits. FREE ACCESS
-
6m 23sDuring this video, you will learn how to discuss virtualization and outline its many benefits. FREE ACCESS
-
10m 32sAfter completing this video, you will be able to compare virtual machines and bare metal hardware as compute options. FREE ACCESS
-
7m 1sUpon completion of this video, you will be able to describe hypervisors and contrast Type 1 and Type 2 hypervisors. FREE ACCESS
-
10m 20sIn this video, we will describe containers and their attributes and benefits relative to virtual machines. FREE ACCESS
-
9m 6sDuring this video, you will learn how to identify standards that apply to container security such as CIS Docker benchmark, ISO/IEC 27001/02, and NIST SP 800-190. FREE ACCESS
-
6m 27sAfter completing this video, you will be able to outline practices in trusted computing such as secure and measured boot, remote attestation, sealed storage, and memory curtaining. FREE ACCESS
-
7m 39sUpon completion of this video, you will be able to analyze uses and features of Trusted Platform Modules and elements of the Trusted Compute Base (TCB). FREE ACCESS
-
2m 27sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.