CSSLP 2024: Security in Cloud Computing Architectures

CSSLP 2024    |    Expert
  • 15 videos | 2h 21s
  • Earns a Badge
Cloud Computing has become so popular and important that it merits special treatment in the context of Domain 4 of CSSLP - instead of focusing entirely on the security aspects of a technology, we will introduce cloud computing and understand the context around its popularity. In this course, you will learn to contrast cloud computing with on-premises computing, focusing on the flexibility and cost-effectiveness of cloud solutions versus the control provided by on-prem deployments. Explore private cloud deployments, followed by an analysis of public, hybrid, and multi-cloud deployment models. Examine different cloud storage options and compare them with traditional storage area networks (SANs) and network attached storage (NAS). Next, you will gain an understanding of cloud service models, including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Explore the shared security responsibilities between cloud providers and customers through the shared responsibility model and analyze the specific security roles within IaaS and PaaS environments. After that, you will focus on security in mobile applications, implicit data collection, and the associated privacy implications. Finally, you will explore hardware platform security, side-channel attacks, return-oriented programming attacks, speculative CPU execution, and secure elements. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare cloud and on-prem computing, and analyzing private cloud deployments
    Compare public, hybrid, and multi-cloud deployments
    Define block storage, object storage, and file storage on the cloud, and contrast with storage rea networks (sans) and network attached storage (nas)
    Describe cloud service models and analyze infrastructure as a service (iaas)
    Describe platform as a service and software as a service cloud service models
    Identify security responsibilities of the cloud service provider (security of the cloud) and the enterprise customer (security in the cloud)
    Describe shared responsibilities in the iaas and paas client service models
  • Examine the owasp mobile top 10 security vulnerabilities for 2024 and analyze security considerations for mobile apps
    Define implicit data collection and dissect famous incidents involving it
    Outline uses of hardware security modules (hsms) and trusted platform modules (tpms)
    Analyze side-channel attacks, return-oriented programming attacks, and countermeasures such as data execution prevention (dep) and address space layout randomization (aslr)
    Define speculative cpu execution, enumerate vulnerabilities caused by this feature, and analyze countermeasures
    Define secure elements and enumerate types of secure elements
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 32s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 9m 49s
    In this video, you will learn how to compare cloud and on-prem computing, and analyzing private cloud deployments. FREE ACCESS
  • Locked
    3.  Deployment Models in Cloud Computing
    13m 28s
    After completing this video, you will be able to compare public, hybrid, and multi-cloud deployments. FREE ACCESS
  • Locked
    4.  Using Cloud Storage
    11m 30s
    Upon completion of this video, you will be able to define block storage, object storage, and file storage on the cloud, and contrast with storage rea networks (SANs) and network attached storage (NAS). FREE ACCESS
  • Locked
    5.  Understanding Cloud Service Models
    7m 24s
    Discover how to describe cloud service models and analyze Infrastructure as a Service (IaaS). FREE ACCESS
  • Locked
    6.  PaaS and SaaS
    8m 49s
    In this video, learn how to describe Platform as a Service and Software as a Service cloud service models. FREE ACCESS
  • Locked
    7.  The Shared Responsibility Model
    11m 10s
    After completing this video, you will be able to identify security responsibilities of the cloud service provider (security of the cloud) and the enterprise customer (security in the cloud). FREE ACCESS
  • Locked
    8.  Shared Responsibilities in IaaS and PaaS
    5m 18s
    Upon completion of this video, you will be able to describe shared responsibilities in the IaaS and PaaS client service models. FREE ACCESS
  • Locked
    9.  Security in Mobile Applications
    12m 37s
    In this video, we will examine the OWASP Mobile Top 10 security vulnerabilities for 2024 and analyze security considerations for mobile apps. FREE ACCESS
  • Locked
    10.  Implicit Data Collection
    5m 28s
    In this video, we will define implicit data collection and dissect famous incidents involving it. FREE ACCESS
  • Locked
    11.  Considerations in Hardware Platform Security
    8m 33s
    Learn how to outline uses of hardware security modules (HSMs) and trusted platform modules (TPMs). FREE ACCESS
  • Locked
    12.  Side-channel Attacks
    10m 8s
    After completing this video, you will be able to analyze side-channel attacks, return-oriented programming attacks, and countermeasures such as data execution prevention (DEP) and address space layout randomization (ASLR). FREE ACCESS
  • Locked
    13.  Speculative Execution Vulnerabilities
    6m 50s
    Upon completion of this video, you will be able to define speculative CPU execution, enumerate vulnerabilities caused by this feature, and analyze countermeasures. FREE ACCESS
  • Locked
    14.  Secure Elements
    4m 23s
    Find out how to define secure elements and enumerate types of secure elements. FREE ACCESS
  • Locked
    15.  Course Summary
    2m 24s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 23 users Rating 4.6 of 23 users (23)
Rating 5.0 of 5 users Rating 5.0 of 5 users (5)
Rating 4.5 of 200 users Rating 4.5 of 200 users (200)