5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Security Solutions     Certified Secure Software Lifecycle Professional (CSSLP) 2019

Explore security architecture considerations such as control identification and prioritization, distributed computing, cloud architectures, mobile applications, and hardware platform concerns in this 12-video course. First, learn to identify characteristics of control identification, or an organization's security controls in an enterprise setting and how to prioritize and enterprise's existing security controls. The course then examines the elements of distributed computing, a type of parallel computing in which software is divided into multiple tasks. Next, learners will explore service-oriented architecture, which is a collection of services that communicate with each other. You will learn about rich Internet web-based applications and pervasive computing, including the Internet of Things, wireless and sensor networks, embedded security architecture, cloud architectures, mobile app architectures, and hardware platforms. Finally, the course explores how an embedded system is designed to perform a specific operation as part of a larger hardware-based machine or system. This course can be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.



Objectives

Certified Secure Software Lifecycle Professional (CSSLP) 2019: Security Architecture

  • discover the key concepts covered in this course
  • identify characteristics of control identification and prioritization
  • recognize types of distributed computing such as client server, peer-to-peer, and message queuing
  • recognize elements of the service-oriented architecture such as enterprise service bus and web services
  • list design considerations for rich Internet applications such as client-side exploits or threats, remote code execution, and constant connectivity
  • describe pervasive computing including IoT, wireless, location-based, RFID, near field communication, and sensor networks
  • list embedded security architecture considerations such as control systems and firmware
  • differentiate between different cloud architectures such as SaaS, PaaS, and IaaS
  • list components of mobile app architecture such as client hardware, client software, interfaces, endpoints, storage, and data transmission
  • list typical security issues relating to mobile applications
  • describe hardware platform concerns
  • summarize the key concepts covered in this course