Secure Application Architecture & IAM
8 Videos | 42m 51s
- Includes Assessment
- Earns a Badge
Examine layers to a secure application architecture, including security devices, cryptography, and sandboxing, and learn about identity and access management (IAM) to help ensure authenticated access to services and hosted applications.
WHAT YOU WILL LEARN
describe associated hardware/software components related to the security of cloud applicationsdefine security protocols and measures associated with application data and data packet protectiondescribe isolation and sandboxing as it applies to cloud-hosted applicationsdescribe the virtualization technology associated with cloud-hosted applications
describe Federated Identity and its deployment for cloud-hosted application authorization and accessdefine Single Sign-On/Off and its place within the cloud service security frameworkdescribe and deploy Multifactor Authentication within a cloud service security frameworkdescribe the phase of NIST’s SDLC and define the difference between SDLF and S-SDLC. List the top five OWASP 2013 attack vectors and define security concerns with respect to RESTful APIs. Outline the difference between Federated Identity and SSO.
IN THIS COURSE
1.Security Devices6m 22sUP NEXT
5.Federation and Identity Provision7m 41s
6.Single Sign-On/Off (SSO)2m 58s
7.Multifactor Authentication3m 39s
8.Specifying Application Security5m 5s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE