5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Security Solutions     Certified Information Systems Security Professional (CISSP) 2021
A security professional needs to be acquainted with security architecture and engineering as they determine the design, implementation, monitoring, and securing of systems and networks of an organization. Use this course to explore the fundamentals of security architecture and engineering.
Learn more about client-server, databases, and distributed systems, examine IoT, containers, serverless, and microservices, and explore embedded system security and constraints in detail. You'll also get familiar with TPM, HPC, and edge computing security.
Upon completion of this course, you'll be able to assess and mitigate the vulnerabilities of modern security architectures, designs, and solutions, as well as understanding the capabilities of securing information systems. Further, you can also use this course to prepare for the CISSP exam.

Objectives

CISSP 2021: Architecture, Design, & Solutions Vulnerabilities

  • discover the key concepts covered in this course
  • compare security between clients-based systems and server-based systems
  • identify the distinctiveness of securing database systems, including scoping, tailoring, tokenizing, and abstraction
  • recognize the security of industrial control systems and supervisory control and data acquisition (SCADA)
  • describe the security of virtualization and cloud-based deployments, such as IaaS, PaaS, SaaS, MSSPs, and CASBs
  • outline the characteristics of securing distributed systems
  • recognize the main vulnerabilities to IoT based on the Open Web Application Security Project (OWASP)
  • compare the security distinctiveness of securing containerized applications, both server-based and serverless, and microservices
  • describe the unique aspects of securing embedded systems and SoC deployments
  • assess the security capabilities of information systems (memory protection, TPM, encryption/decryption)
  • describe security of high-performance computing (HPC) systems and edge computing systems
  • summarize the key concepts covered in this course