CSSLP 2024: Security in Cloud Computing Architectures
CSSLP 2024
| Expert
- 15 videos | 2h 21s
- Includes Assessment
- Earns a Badge
Cloud Computing has become so popular and important that it merits special treatment in the context of Domain 4 of CSSLP - instead of focusing entirely on the security aspects of a technology, we will introduce cloud computing and understand the context around its popularity. In this course, you will learn to contrast cloud computing with on-premises computing, focusing on the flexibility and cost-effectiveness of cloud solutions versus the control provided by on-prem deployments. Explore private cloud deployments, followed by an analysis of public, hybrid, and multi-cloud deployment models. Examine different cloud storage options and compare them with traditional storage area networks (SANs) and network attached storage (NAS). Next, you will gain an understanding of cloud service models, including Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS). Explore the shared security responsibilities between cloud providers and customers through the shared responsibility model and analyze the specific security roles within IaaS and PaaS environments. After that, you will focus on security in mobile applications, implicit data collection, and the associated privacy implications. Finally, you will explore hardware platform security, side-channel attacks, return-oriented programming attacks, speculative CPU execution, and secure elements. This course prepares learners for the Certified Secure Software Lifecycle Professional (CSSLP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseCompare cloud and on-prem computing, and analyzing private cloud deploymentsCompare public, hybrid, and multi-cloud deploymentsDefine block storage, object storage, and file storage on the cloud, and contrast with storage area networks (sans) and network attached storage (nas)Describe cloud service models and analyze infrastructure as a service (iaas)Describe platform as a service and software as a service cloud service modelsIdentify security responsibilities of the cloud service provider (security of the cloud) and the enterprise customer (security in the cloud)Describe shared responsibilities in the iaas and paas client service models
-
Examine the owasp mobile top 10 security vulnerabilities for 2024 and analyze security considerations for mobile appsDefine implicit data collection and dissect famous incidents involving itOutline uses of hardware security modules (hsms) and trusted platform modules (tpms)Analyze side-channel attacks, return-oriented programming attacks, and countermeasures such as data execution prevention (dep) and address space layout randomization (aslr)Define speculative cpu execution, enumerate vulnerabilities caused by this feature, and analyze countermeasuresDefine secure elements and enumerate types of secure elementsSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 32sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 49sIn this video, you will learn how to compare cloud and on-prem computing, and analyzing private cloud deployments. FREE ACCESS
-
13m 28sAfter completing this video, you will be able to compare public, hybrid, and multi-cloud deployments. FREE ACCESS
-
11m 30sUpon completion of this video, you will be able to define block storage, object storage, and file storage on the cloud, and contrast with storage area networks (SANs) and network attached storage (NAS). FREE ACCESS
-
7m 24sDiscover how to describe cloud service models and analyze Infrastructure as a Service (IaaS). FREE ACCESS
-
8m 49sIn this video, learn how to describe Platform as a Service and Software as a Service cloud service models. FREE ACCESS
-
11m 10sAfter completing this video, you will be able to identify security responsibilities of the cloud service provider (security of the cloud) and the enterprise customer (security in the cloud). FREE ACCESS
-
5m 18sUpon completion of this video, you will be able to describe shared responsibilities in the IaaS and PaaS client service models. FREE ACCESS
-
12m 37sIn this video, we will examine the OWASP Mobile Top 10 security vulnerabilities for 2024 and analyze security considerations for mobile apps. FREE ACCESS
-
5m 28sIn this video, we will define implicit data collection and dissect famous incidents involving it. FREE ACCESS
-
8m 33sLearn how to outline uses of hardware security modules (HSMs) and trusted platform modules (TPMs). FREE ACCESS
-
10m 8sAfter completing this video, you will be able to analyze side-channel attacks, return-oriented programming attacks, and countermeasures such as data execution prevention (DEP) and address space layout randomization (ASLR). FREE ACCESS
-
6m 50sUpon completion of this video, you will be able to define speculative CPU execution, enumerate vulnerabilities caused by this feature, and analyze countermeasures. FREE ACCESS
-
4m 23sFind out how to define secure elements and enumerate types of secure elements. FREE ACCESS
-
2m 24sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.