CSSLP 2024: Secure Software Architectures & Frameworks
CSSLP 2024
| Expert
- 16 videos | 2h 6m 28s
- Earns a Badge
The Secure Software Architecture and Design CSSLP domain focuses on the ability to apply security practices to each phase of the software development life cycle, spanning topics from high-level models like SABSA and the Zachman Framework to cloud computing, VMs, hypervisors, containers, and industrial IoT systems. In this course, you'll learn how to organize and categorize security architectures, including the Sherwood Applied Business Security Architecture (SABSA). Explore various types of distributed computing architectures, the client-server architecture, and peer-to-peer (P2P) networks along with their security challenges. From there, you'll dive into service-oriented architectures (SOAs), analyze the security benefits of microservices and containers, examine Rich Internet Applications (RIAs), and cover how to prevent Remote Code Execution (RCE) attacks. After that, you'll study the implications of different types of connectivity, location-based services, RFID, NFC, and sensor and mesh networks. You'll finish with a focus on Embedded Systems and learn the significance of Secure Boot and Secure Memory, Secure Update Mechanisms, and Field-programmable Gate Arrays (FPGAs). This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the zachman framework for security architecturesDefine the sherwood applied business security architecture (sabsa) for risk-driven enterprise security architecturesDefine distributed computing, enumerate types of distributed computing architectures, and analyze the client-server architectureAnalyze the unique security challenges of peer-to-peer (p2p) networks, and describe message queuesDescribe n-tier architectures and the common layers, and then analyze the special case of the three-tier architectureIdentify attributes of service-oriented architectures and describe the enterprise service bus (esb)Describe web services and the use of simple object access protocol (soap), representational state transfer (rest), and xml
-
Enumerate properties of microservice-based architectures and analyze how they leverage containersDefine rias and analyze security considerations in client-side technologiesDefine rce attacks and analyze the role of input validation and safe serialization in mitigating such attacksAnalyze security concerns arising from constant connectivity, pervasive/ubiquitous computing, and wireless communicationsEnumerate security concerns with location-based services, radio frequency identification (rfid), near field communication (nfc), and sensor and mesh networksOutline the use of secure boot and secure memory in embedded systemsAnalyze the growing need for secure update mechanisms and outline security concerns in the use of field-programmable gate arrays (fpgas)Summarize the key concepts covered in this course
IN THIS COURSE
-
2m 38sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 25sAfter completing this video, you will be able to outline the Zachman Framework for security architectures. FREE ACCESS
-
4m 32sIn this video, we will define the Sherwood Applied Business Security Architecture (SABSA) for risk-driven enterprise security architectures. FREE ACCESS
-
8m 52sIn this video, find out how to define distributed computing, enumerate types of distributed computing architectures, and analyze the client-server architecture. FREE ACCESS
-
8m 9sLearn how to analyze the unique security challenges of peer-to-peer (P2P) networks, and describe message queues. FREE ACCESS
-
7m 31sIn this video, we will describe n-tier architectures and the common layers, and then analyze the special case of the three-tier architecture. FREE ACCESS
-
6m 48sIn this video, you will learn how to identify attributes of service-oriented architectures and describe the enterprise service bus (ESB). FREE ACCESS
-
7m 9sAfter completing this video, you will be able to describe web services and the use of Simple Object Access Protocol (SOAP), REpresentational State Transfer (REST), and XML. FREE ACCESS
-
9m 10sUpon completion of this video, you will be able to enumerate properties of microservice-based architectures and analyze how they leverage containers. FREE ACCESS
-
9m 21sIn this video, learn how to define RIAs and analyze security considerations in client-side technologies. FREE ACCESS
-
4m 31sDuring this video, discover how to define RCE attacks and analyze the role of input validation and safe serialization in mitigating such attacks. FREE ACCESS
-
12m 2sAfter completing this video, you will be able to analyze security concerns arising from constant connectivity, pervasive/ubiquitous computing, and wireless communications. FREE ACCESS
-
10m 28sUpon completion of this video, you will be able to enumerate security concerns with location-based services, Radio Frequency Identification (RFID), Near Field Communication (NFC), and Sensor and Mesh Networks. FREE ACCESS
-
12m 28sAfter completing this video, you will be able to outline the use of secure boot and secure memory in embedded systems. FREE ACCESS
-
9m 26sDuring this video, you will learn how to analyze the growing need for secure update mechanisms and outline security concerns in the use of Field-programmable Gate Arrays (FPGAs). FREE ACCESS
-
2m 40sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.