CSSLP 2024: Secure Software Concepts

CSSLP 2024    |    Expert
  • 9 videos | 1h 19m 14s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Understanding secure software concepts is crucial for the CSSLP exam as it ensures professionals can design, implement, and manage secure software systems. In this course, you will explore the fundamental principles of confidentiality, integrity, and availability. Then, you will discover the core concepts of authentication, authorization, and accountability, learning how to verify identities, control access, and ensure actions are traceable. Next, you will investigate various threats to confidentiality, including social engineering and malware, as well as common misconfigurations and software vulnerabilities, emphasizing the importance of secure coding practices and regular security assessments to mitigate these risks. You will examine techniques to enhance confidentiality through encryption and access controls, ensuring data protection both at rest and in transit. Finally, you will focus on advanced authentication methods such as multi-factor authentication (MFA), certificate-based authentication, and single sign-on (SSO) and you will learn about federated identity protocols, which provide secure and seamless access across multiple systems and organizations. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define the cia triad of confidentiality, integrity, and availability in information security
    Contrast authentication, authorization and accountability in identity management
    Enumerate threats to confidentiality and describe social engineering and network threats
    Detail threats related to misconfiguration, storage, and software vulnerabilities
  • Analyze encryption and access control as mechanisms to ensure confidentiality
    Define and provide examples of multi-factor authentication (mfa), certificate-based authentication (cba), and single sign-on (sso)
    Contrast kerberos, security assertion markup language (saml), oauth, and openid connect (oidc) in federated authentication use cases
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 47s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 8m 42s
    After completing this video, you will be able to define the CIA triad of confidentiality, integrity, and availability in information security. FREE ACCESS
  • Locked
    3.  Authentication, Authorization, and Accountability
    11m 33s
    Upon completion of this video, you will be able to contrast authentication, authorization and accountability in identity management. FREE ACCESS
  • Locked
    4.  Threats to Confidentiality
    9m 32s
    After completing this video, you will be able to enumerate threats to confidentiality and describe social engineering and network threats. FREE ACCESS
  • Locked
    5.  Misconfigurations and Software Vulnerabilities
    13m 5s
    Upon completion of this video, you will be able to detail threats related to misconfiguration, storage, and software vulnerabilities. FREE ACCESS
  • Locked
    6.  Encryption and Access Controls for Confidentiality
    11m 38s
    After completing this video, you will be able to analyze encryption and access control as mechanisms to ensure confidentiality. FREE ACCESS
  • Locked
    7.  Using MFA, CBA, and SSO for Authentication
    12m 54s
    Upon completion of this video, you will be able to define and provide examples of multi-factor authentication (MFA), certificate-based authentication (CBA), and single sign-on (SSO). FREE ACCESS
  • Locked
    8.  Federated Identity Protocols
    7m 52s
    After completing this video, you will be able to contrast Kerberos, Security Assertion Markup Language (SAML), OAuth, and OpenID Connect (OIDC) in federated authentication use cases. FREE ACCESS
  • Locked
    9.  Course Summary
    2m 11s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 30 users Rating 4.6 of 30 users (30)
Rating 5.0 of 3 users Rating 5.0 of 3 users (3)
Rating 4.8 of 4 users Rating 4.8 of 4 users (4)