|
This course covers Domain 4 of the Certified Information Systems Security Professional (CISSP) exam. It explains what you need to know about the security controls that are included within systems and applications software and the steps used in their development in both distributed and centralized environments.
Objectives:
- Demonstrate an understanding of challenges in both distributed and nondistributed environments
- Discuss databases and data warehousing issues
- Describe knowledge-based systems and examples of edge computing
- Discuss the types of attacks made on software vulnerabilities
- Describe and define malicious code
- Discuss system development controls
Topics:
- Distributed and nondistributed environment challenges
- Database and data warehousing issues
- Storage and storage systems
- Knowledge-based systems and edge computing
- Attacking software
- Understanding malicious code
- System development lifecycle models
- Security control architecture
- Software development methodologies
- Secure software design and coding practices
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|