Certified Secure Software Lifecycle Professional (CSSLP) 2019: Technologies

placeholder

In this 13-video course learners can explore best practices for securing commonly used architecture and technologies such as virtualization databases and the programming language environment. First learn the three steps involved in authentication and identity management. Next earn the principles of Credential Management and protecting credentials used for authentication including passwords tokens biometrics and certificates. Learners will then examine logging or recording a user s actions within a system and data flow control methods. Next learn about data loss prevention as an in-depth security strategy that encompasses many different technologies. Learn how virtualization allows for software to be hosted in a virtual environment. Learners will then examine digit rights management (DMR) which restricts access to content that is not local to secure digital content and protect intellectual property. Finally the course explores the basis of trusted computingùthe hardware software and firmware components critical to securing a system which includes discussion of programming language and operating systems. This course may be used in preparation for the (ISC)2 CSSLP: Certified Secure Software Lifecycle Professional certification exam.