From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
SOA and microservices
From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
SOA and microservices
- [Instructor] Service oriented architecture, or SOA, is a design philosophy that encourages organizations to create discrete services that may be accessed by customers and other users in a black box fashion. Users don't need to know how the service works. They just need to know what the service does and how to access it. The Open Group, a standards body for architecture, defines SOA services using four key characteristics. Services are logical representations of a repeatable business activity that has a specified outcome, they are self-contained, they may be composed of other underlying services, and they have that black box quality that we just discussed. Users don't need to know how the service works, just what the service does and how they can access it. The SOA approach is popular among developers because it facilitates the integration of services from different vendors. If your sales system comes from a different…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
What is the cloud?3m 53s
-
Cloud computing roles2m 35s
-
(Locked)
Drivers for cloud computing3m 17s
-
(Locked)
Multitenant computing2m 15s
-
(Locked)
Virtualization4m 48s
-
(Locked)
Desktop and application virtualization2m 38s
-
(Locked)
Cloud compute resources7m 52s
-
(Locked)
Containerization1m 58s
-
(Locked)
Cloud activities and the Cloud Reference Architecture2m 49s
-
(Locked)
Cloud deployment models2m 45s
-
(Locked)
Cloud service categories5m 21s
-
(Locked)
Edge and fog computing1m 46s
-
-
-
(Locked)
OWASP Top 105m 36s
-
(Locked)
SQL injection prevention4m 25s
-
(Locked)
Cross-site scripting prevention3m 17s
-
(Locked)
Cross-site request forgery prevention4m 8s
-
(Locked)
Defending against directory traversal3m 6s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Privilege escalation1m 56s
-
(Locked)
-
-
(Locked)
Understanding encryption2m 49s
-
(Locked)
Symmetric and asymmetric cryptography4m 18s
-
(Locked)
Goals of cryptography3m 47s
-
(Locked)
Codes and ciphers3m 5s
-
(Locked)
Cryptographic math2m 38s
-
(Locked)
Choosing encryption algorithms3m 27s
-
(Locked)
The perfect encryption algorithm3m 21s
-
(Locked)
The cryptographic lifecycle2m 34s
-
(Locked)
-
-
(Locked)
Trust models2m 52s
-
(Locked)
PKI and digital certificates4m 5s
-
(Locked)
Hash functions7m 38s
-
(Locked)
Digital signatures3m 51s
-
(Locked)
Digital signature standard1m 40s
-
(Locked)
Create a digital certificate4m 55s
-
(Locked)
Revoke a digital certificate1m 41s
-
(Locked)
Certificate stapling2m 29s
-
(Locked)
Certificate authorities6m 13s
-
(Locked)
Certificate subjects3m 35s
-
(Locked)
Certificate types2m 55s
-
(Locked)
Certificate formats2m 30s
-
(Locked)