CSSLP 2024: Secure Software Concepts
CSSLP 2024
| Expert
- 9 videos | 1h 19m 14s
- Includes Assessment
- Earns a Badge
Understanding secure software concepts is crucial for the CSSLP exam as it ensures professionals can design, implement, and manage secure software systems. In this course, you will explore the fundamental principles of confidentiality, integrity, and availability. Then, you will discover the core concepts of authentication, authorization, and accountability, learning how to verify identities, control access, and ensure actions are traceable. Next, you will investigate various threats to confidentiality, including social engineering and malware, as well as common misconfigurations and software vulnerabilities, emphasizing the importance of secure coding practices and regular security assessments to mitigate these risks. You will examine techniques to enhance confidentiality through encryption and access controls, ensuring data protection both at rest and in transit. Finally, you will focus on advanced authentication methods such as multi-factor authentication (MFA), certificate-based authentication, and single sign-on (SSO) and you will learn about federated identity protocols, which provide secure and seamless access across multiple systems and organizations. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine the cia triad of confidentiality, integrity, and availability in information securityContrast authentication, authorization and accountability in identity managementEnumerate threats to confidentiality and describe social engineering and network threatsDetail threats related to misconfiguration, storage, and software vulnerabilities
-
Analyze encryption and access control as mechanisms to ensure confidentialityDefine and provide examples of multi-factor authentication (mfa), certificate-based authentication (cba), and single sign-on (sso)Contrast kerberos, security assertion markup language (saml), oauth, and openid connect (oidc) in federated authentication use casesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 47sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
8m 42sAfter completing this video, you will be able to define the CIA triad of confidentiality, integrity, and availability in information security. FREE ACCESS
-
11m 33sUpon completion of this video, you will be able to contrast authentication, authorization and accountability in identity management. FREE ACCESS
-
9m 32sAfter completing this video, you will be able to enumerate threats to confidentiality and describe social engineering and network threats. FREE ACCESS
-
13m 5sUpon completion of this video, you will be able to detail threats related to misconfiguration, storage, and software vulnerabilities. FREE ACCESS
-
11m 38sAfter completing this video, you will be able to analyze encryption and access control as mechanisms to ensure confidentiality. FREE ACCESS
-
12m 54sUpon completion of this video, you will be able to define and provide examples of multi-factor authentication (MFA), certificate-based authentication (CBA), and single sign-on (SSO). FREE ACCESS
-
7m 52sAfter completing this video, you will be able to contrast Kerberos, Security Assertion Markup Language (SAML), OAuth, and OpenID Connect (OIDC) in federated authentication use cases. FREE ACCESS
-
2m 11sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.