Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture
CSSLP 2019
| Intermediate
- 12 Videos | 50m 29s
- Includes Assessment
- Earns a Badge
Explore security architecture considerations such as control identification and prioritization, distributed computing, cloud architectures, mobile applications, and hardware platform concerns in this 12-video course. First, learn to identify characteristics of control identification, or an organization's security controls in an enterprise setting and how to prioritize and enterprise's existing security controls. The course then examines the elements of distributed computing, a type of parallel computing in which software is divided into multiple tasks. Next, learners will explore service-oriented architecture, which is a collection of services that communicate with each other. You will learn about rich Internet web-based applications and pervasive computing, including the Internet of Things, wireless and sensor networks, embedded security architecture, cloud architectures, mobile app architectures, and hardware platforms. Finally, the course explores how an embedded system is designed to perform a specific operation as part of a larger hardware-based machine or system. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courseidentify characteristics of control identification and prioritizationrecognize types of distributed computing such as client server, peer-to-peer, and message queuingrecognize elements of the service-oriented architecture such as enterprise service bus and web serviceslist design considerations for rich Internet applications such as client-side exploits or threats, remote code execution, and constant connectivitydescribe pervasive computing including IoT, wireless, location-based, RFID, near field communication, and sensor networks
-
list embedded security architecture considerations such as control systems and firmwaredifferentiate between different cloud architectures such as SaaS, PaaS, and IaaSlist components of mobile app architecture such as client hardware, client software, interfaces, endpoints, storage, and data transmissionlist typical security issues relating to mobile applicationsdescribe hardware platform concernssummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 7sUP NEXT
-
2.Control Identification and Prioritization3m 22s
-
3.Distributed Computing5m 49s
-
4.Service-oriented Architecture4m 35s
-
5.Rich Internet Applications4m 49s
-
6.Pervasive Computing4m 18s
-
7.Embedded Systems5m 22s
-
8.Cloud Architectures5m 9s
-
9.Mobile Applications2m 59s
-
10.Security Issues in Mobile Applications8m 35s
-
11.Hardware Platform Concerns2m 14s
-
12.Course Summary1m 9s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.