Secure Application and Data Architecture Design
Cybersecurity
| Beginner
- 20 videos | 55m 56s
- Includes Assessment
- Earns a Badge
Security architects design and implement secure architectures and translate business processes and risk into policy and implementation rules. In this course, you'll explore designing secure application and data architectures. First, you'll examine the history of development, the role of the application architect, and application architecture goals. Next, you'll learn about disciplines related to application architecture, as well as Service-oriented Architecture and its standards. You'll move on to learn about modular framework development, authentication, patching, and vulnerability testing. Next, you'll examine data architecture, data classification, data privacy, and database security. Finally, you'll learn about encryption and big data, as well as data architecture analysis and influences.
WHAT YOU WILL LEARN
-
Recognize important elements of secure application architecture designRecognize how aspects of the history of development impact the application architectureDescribe the role of the application architect and the skillset they should haveRecognize application architecture goalsRecognize disciplines related to application architecture like the software development life cycle, secure coding, and secure devopsDescribe service-oriented architecture (soa) and its tenetsDescribe soa standards, web services, and risksRecognize how a modular framework can be used in the development processDescribe authentication, including services that can be used internally and externallyDescribe patching and recognize the importance of patch management
-
Recognize various methods of vulnerability testingRecognize important elements in secure data architecture designDescribe data architecture and its goalsDescribe various forms of data classification, associated considerations, and controlsRecognize restrictions, considerations, and risks for private dataRecognize high-level concerns for database securityRecognize general and database encryptions optionsDescribe big data, its uses, and security concernsDescribe the purpose of and need for data architecture analysisRecognize factors that influence data architecture decisions
IN THIS COURSE
-
28s
-
1m 41s
-
1m 37s
-
3m 6s
-
3m 3s
-
3m 59s
-
3m 35s
-
2m 42s
-
2m 53s
-
2m 37s
-
2m 42s
-
26s
-
3m 5s
-
7m 11s
-
4m 46s
-
4m 17s
-
2m 58s
-
1m 35s
-
1m 4s
-
2m 9s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.