Secure Design

Expert
  • 16 Videos | 1h 27m 49s
  • Includes Assessment
  • Earns a Badge
Likes 52 Likes 52
Security practices must be integrated in every aspect of software design. Explore secure software design processes, such as attack surface evaluation, control identification and prioritization, and threat modeling.

WHAT YOU WILL LEARN

  • measure and minimize attack surface
    recognize threat modeling techniques and purpose of documentation
    identify characteristics of control identification and prioritization
    identify characteristics of design and architecture technical review
    identify characteristics of risk assessment for code reuse
    distinguish between applicable methods to address core security concepts
    recognize security design principle best practices
    distinguish between interconnectivity activities best practices
  • identify interfaces best practices
    distinguish between the different architectural forms and supporting elements of secured distributed computing
    recognize best practices for securing service-oriented architecture
    recognize best practices for securing rich Internet applications
    recognize best practices for securing pervasive and ubiquitous computing
    recognize best security practices when integrating with existing architectures
    recognize best practices for securing cloud architectures
    recognize best practices for securing mobile applications

IN THIS COURSE

  • Playable
    1. 
    Attack Surface Evaluation
    6m 18s
    UP NEXT
  • Playable
    2. 
    Threat Modeling and Documentation
    4m 51s
  • Locked
    3. 
    Control Identification and Prioritization
    4m 48s
  • Locked
    4. 
    Design and Architecture Technical Review
    3m 27s
  • Locked
    5. 
    Risk Assessment for Code Reuse
    3m 27s
  • Locked
    6. 
    Applicable Methods to Address Core Security Concepts
    6m 7s
  • Locked
    7. 
    Security Design Principles
    4m 42s
  • Locked
    8. 
    Interconnectivity
    4m 38s
  • Locked
    9. 
    Interfaces
    4m 11s
  • Locked
    10. 
    Distributed Computing
    4m 59s
  • Locked
    11. 
    Service-oriented Architecture
    5m 15s
  • Locked
    12. 
    Rich Internet Applications
    6m 6s
  • Locked
    13. 
    Pervasive and Ubiquitous Computing
    6m 50s
  • Locked
    14. 
    Integrating with Existing Architectures
    4m 17s
  • Locked
    15. 
    Cloud Architectures
    6m 36s
  • Locked
    16. 
    Mobile Applications
    3m 18s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 1 Likes 1  
Likes 9 Likes 9  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 244 Likes 244  
Likes 107 Likes 107  
COURSE SOLID & GRASP
Likes 3218 Likes 3218