Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies

CSSLP 2019    |    Intermediate
  • 13 videos | 1h 1m 32s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 44 users Rating 4.4 of 44 users (44)
In this 13-video course, learners can explore best practices for securing commonly used architecture and technologies such as virtualization, databases, and the programming language environment. First, learn the three steps involved in authentication and identity management. Next, earn the principles of Credential Management and protecting credentials used for authentication, including passwords, tokens, biometrics, and certificates. Learners will then examine logging or recording a user's actions within a system, and data flow control methods. Next, learn about data loss prevention as an in-depth security strategy that encompasses many different technologies. Learn how virtualization allows for software to be hosted in a virtual environment. Learners will then examine digit rights management (DMR), which restricts access to content that is not local to secure digital content, and protect intellectual property. Finally, the course explores the basis of trusted computing-the hardware, software, and firmware components critical to securing a system which includes discussion of programming language and operating systems. This course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Distinguish between characteristics of authentication and identity management
    Recognize characteristics of credential management
    Distinguish between flow control methods
    Recognize characteristics of logging
    Recognize characteristics of data loss prevention
    Identify benefits of virtualization in secure software design
  • Recognize types of rights expression languages in digital rights management
    Recognize characteristics of trusted computing
    Distinguish between database security techniques
    Distinguish between compilers, interpreters, and hybrid source codes
    Recognize characteristics of operating systems
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 50s
  • 7m 22s
    In this video, learn how to distinguish between characteristics of authentication and identity management. FREE ACCESS
  • Locked
    3.  Credential Management
    5m 48s
    After completing this video, you will be able to recognize characteristics of credential management. FREE ACCESS
  • Locked
    4.  Flow Control Methods
    5m 10s
    In this video, you will learn how to distinguish between flow control methods. FREE ACCESS
  • Locked
    5.  Logging
    4m 34s
    Upon completion of this video, you will be able to recognize characteristics of logs. FREE ACCESS
  • Locked
    6.  Data Loss Prevention
    5m 3s
    Upon completion of this video, you will be able to recognize characteristics of data loss prevention. FREE ACCESS
  • Locked
    7.  Virtualization
    5m 9s
    Find out how to identify benefits of virtualization in secure software design. FREE ACCESS
  • Locked
    8.  Digital Rights Management
    3m 47s
    Upon completion of this video, you will be able to recognize types of rights expression languages used in digital rights management. FREE ACCESS
  • Locked
    9.  Trusted Computing
    6m 10s
    Upon completion of this video, you will be able to recognize characteristics of trusted computing. FREE ACCESS
  • Locked
    10.  Database Security
    4m 57s
    Find out how to distinguish between different database security techniques. FREE ACCESS
  • Locked
    11.  Programming Language Environment
    6m 51s
    Learn how to distinguish between compilers, interpreters, and hybrid source code. FREE ACCESS
  • Locked
    12.  Operating Systems
    3m 32s
    After completing this video, you will be able to recognize characteristics of operating systems. FREE ACCESS
  • Locked
    13.  Course Summary
    1m 19s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 498 users Rating 4.6 of 498 users (498)
Rating 4.6 of 164 users Rating 4.6 of 164 users (164)
Rating 4.6 of 147 users Rating 4.6 of 147 users (147)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 356 users Rating 4.5 of 356 users (356)
Rating 4.5 of 261 users Rating 4.5 of 261 users (261)