CISSP 2021: Architecture, Design, & Solutions Vulnerabilities

CISSP 2021
  • 12 Videos | 51m 38s
  • Earns a Badge
A security professional needs to be acquainted with security architecture and engineering as they determine the design, implementation, monitoring, and securing of systems and networks of an organization. Use this course to explore the fundamentals of security architecture and engineering. Learn more about client-server, databases, and distributed systems, examine IoT, containers, serverless, and microservices, and explore embedded system security and constraints in detail. You'll also get familiar with TPM, HPC, and edge computing security. Upon completion of this course, you'll be able to assess and mitigate the vulnerabilities of modern security architectures, designs, and solutions, as well as understanding the capabilities of securing information systems. Further, you can also use this course to prepare for the CISSP exam.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    compare security between clients-based systems and server-based systems
    identify the distinctiveness of securing database systems, including scoping, tailoring, tokenizing, and abstraction
    recognize the security of industrial control systems and supervisory control and data acquisition (SCADA)
    describe the security of virtualization and cloud-based deployments, such as IaaS, PaaS, SaaS, MSSPs, and CASBs
    outline the characteristics of securing distributed systems
  • recognize the main vulnerabilities to IoT based on the Open Web Application Security Project (OWASP)
    compare the security distinctiveness of securing containerized applications, both server-based and serverless, and microservices
    describe the unique aspects of securing embedded systems and SoC deployments
    assess the security capabilities of information systems (memory protection, TPM, encryption/decryption)
    describe security of high-performance computing (HPC) systems and edge computing systems
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 26s
    UP NEXT
  • Playable
    2. 
    Client vs. Server-based Systems
    3m 27s
  • Locked
    3. 
    Database Systems
    5m 49s
  • Locked
    4. 
    Industrial Control Systems
    2m 10s
  • Locked
    5. 
    Virtualized and Cloud-based Systems
    11m 15s
  • Locked
    6. 
    Distributed Systems
    2m 55s
  • Locked
    7. 
    Internet of Things (IoT)
    2m 27s
  • Locked
    8. 
    Containerization, Serverless, and Microservices
    7m 41s
  • Locked
    9. 
    Embedded Systems
    5m 37s
  • Locked
    10. 
    Trusted Platform Module (TPM) and Memory Protection
    4m 1s
  • Locked
    11. 
    HPC and Edge Computing Systems
    4m 4s
  • Locked
    12. 
    Course Summary
    47s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.