Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture

CSSLP 2019
  • 12 Videos | 55m 29s
  • Includes Assessment
  • Earns a Badge
Likes 19 Likes 19
Explore security architecture considerations such as control identification and prioritization, distributed computing, cloud architectures, mobile applications, and hardware platform concerns in this 12-video course. First, learn to identify characteristics of control identification, or an organization's security controls in an enterprise setting and how to prioritize and enterprise's existing security controls. The course then examines the elements of distributed computing, a type of parallel computing in which software is divided into multiple tasks. Next, learners will explore service-oriented architecture, which is a collection of services that communicate with each other. You will learn about rich Internet web-based applications and pervasive computing, including the Internet of Things, wireless and sensor networks, embedded security architecture, cloud architectures, mobile app architectures, and hardware platforms. Finally, the course explores how an embedded system is designed to perform a specific operation as part of a larger hardware-based machine or system. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    identify characteristics of control identification and prioritization
    recognize types of distributed computing such as client server, peer-to-peer, and message queuing
    recognize elements of the service-oriented architecture such as enterprise service bus and web services
    list design considerations for rich Internet applications such as client-side exploits or threats, remote code execution, and constant connectivity
    describe pervasive computing including IoT, wireless, location-based, RFID, near field communication, and sensor networks
  • list embedded security architecture considerations such as control systems and firmware
    differentiate between different cloud architectures such as SaaS, PaaS, and IaaS
    list components of mobile app architecture such as client hardware, client software, interfaces, endpoints, storage, and data transmission
    list typical security issues relating to mobile applications
    describe hardware platform concerns
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 7s
    UP NEXT
  • Playable
    2. 
    Control Identification and Prioritization
    3m 22s
  • Locked
    3. 
    Distributed Computing
    5m 49s
  • Locked
    4. 
    Service-oriented Architecture
    4m 35s
  • Locked
    5. 
    Rich Internet Applications
    4m 49s
  • Locked
    6. 
    Pervasive Computing
    4m 18s
  • Locked
    7. 
    Embedded Systems
    5m 22s
  • Locked
    8. 
    Cloud Architectures
    5m 9s
  • Locked
    9. 
    Mobile Applications
    2m 59s
  • Locked
    10. 
    Security Issues in Mobile Applications
    8m 35s
  • Locked
    11. 
    Hardware Platform Concerns
    2m 14s
  • Locked
    12. 
    Course Summary
    1m 9s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.