CSSLP 2024: Security Design Principles
CSSLP 2024
| Expert
- 10 videos | 1h 16m 8s
- Includes Assessment
- Earns a Badge
Security design principles are crucial for the CSSLP exam as they enable professionals to create resilient software systems, protect sensitive data, mitigate risks, and ensure compliance with industry standards, ultimately enhancing overall cybersecurity and professional credibility. In this course, you will explore security controls for integrity and the use of digital signatures to verify the origin and integrity of data. Next, you will learn about security controls for availability, including redundancy, replication, clustering, scalability, and resiliency to help ensure that systems remain operational and accessible even in the face of failures or high demand. Then you will also examine the concepts of privacy and nonrepudiation, as well as essential security design principles, such as least privilege, separation of duties, and Defense in Depth. Finally, you will investigate economy of mechanism, complete mediation, the principles of open design, and Kerckhoffs's principle, emphasizing simplicity, thoroughness, and transparency in security designs. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline security controls that provide integrityAnalyze use cases of keys, including digital signingEnumerate technical and non-technical aspects of ensuring availabilityDefine and analyze privacy and nonrepudiation
-
Identify the applicability of the health insurance portability and accountability act (hipaa), the payment card industry data security standard (pci dss), the federal information security modernization act (fisma), the california consumer privacy act (ccpa), the general data protection regulation (gdpr), and the gramm-leach-bliley act (glba)Implement least privilege, segregation of duties, and defense in depthContrast the principles of complete mediation and economy of mechanismProvide an overview of open design, kerckhoff's principle, and least common mechanismSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 54sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 34sAfter completing this video, you will be able to outline security controls that provide integrity. FREE ACCESS
-
8m 37sUpon completion of this video, you will be able to analyze use cases of keys, including digital signing. FREE ACCESS
-
12m 1sAfter completing this video, you will be able to enumerate technical and non-technical aspects of ensuring availability. FREE ACCESS
-
8m 28sUpon completion of this video, you will be able to define and analyze privacy and nonrepudiation. FREE ACCESS
-
4m 40sAfter completing this video, you will be able to identify the applicability of the Health Insurance Portability and Accountability Act (HIPAA), the Payment Card Industry Data Security Standard (PCI DSS), the Federal Information Security Modernization Act (FISMA), the California Consumer Privacy Act (CCPA), the General Data Protection Regulation (GDPR), and the Gramm-Leach-Bliley Act (GLBA). FREE ACCESS
-
9m 48sUpon completion of this video, you will be able to implement least privilege, segregation of duties, and Defense in Depth. FREE ACCESS
-
10m 7sAfter completing this video, you will be able to contrast the principles of complete mediation and economy of mechanism. FREE ACCESS
-
8m 53sUpon completion of this video, you will be able to provide an overview of open design, Kerckhoff's principle, and least common mechanism. FREE ACCESS
-
2m 5sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.