From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
SOAP and REST
From the course: CISSP Cert Prep (2021): 3 Security Architecture and Engineering
SOAP and REST
- [Instructor] Application programming interfaces are the most popular way to integrate systems and interact with web services. An application programming interface, or an API, is a set of exposed interfaces that allow programmatic interaction between services. For example, Amazon Web Services publishes an API that allows developers to provision computing resources, maintain their cloud environment, and perform other administrative actions. Twitter also publishes an API that allows users to post tweets, search through other users' tweets, and perform the same interactions with the Twitter service that they would normally perform through the website in an automated way. This API allows anyone to write code that interacts with Twitter or use applications built by other developers that leverage the Twitter API. The earliest APIs made use of a standard called the simple object access protocol, or SOAP. SOAP allows the exchange of…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
What is the cloud?3m 53s
-
Cloud computing roles2m 35s
-
(Locked)
Drivers for cloud computing3m 17s
-
(Locked)
Multitenant computing2m 15s
-
(Locked)
Virtualization4m 48s
-
(Locked)
Desktop and application virtualization2m 38s
-
(Locked)
Cloud compute resources7m 52s
-
(Locked)
Containerization1m 58s
-
(Locked)
Cloud activities and the Cloud Reference Architecture2m 49s
-
(Locked)
Cloud deployment models2m 45s
-
(Locked)
Cloud service categories5m 21s
-
(Locked)
Edge and fog computing1m 46s
-
-
-
(Locked)
OWASP Top 105m 36s
-
(Locked)
SQL injection prevention4m 25s
-
(Locked)
Cross-site scripting prevention3m 17s
-
(Locked)
Cross-site request forgery prevention4m 8s
-
(Locked)
Defending against directory traversal3m 6s
-
(Locked)
Overflow attacks3m 21s
-
(Locked)
Session hijacking4m 8s
-
(Locked)
Privilege escalation1m 56s
-
(Locked)
-
-
(Locked)
Understanding encryption2m 49s
-
(Locked)
Symmetric and asymmetric cryptography4m 18s
-
(Locked)
Goals of cryptography3m 47s
-
(Locked)
Codes and ciphers3m 5s
-
(Locked)
Cryptographic math2m 38s
-
(Locked)
Choosing encryption algorithms3m 27s
-
(Locked)
The perfect encryption algorithm3m 21s
-
(Locked)
The cryptographic lifecycle2m 34s
-
(Locked)
-
-
(Locked)
Trust models2m 52s
-
(Locked)
PKI and digital certificates4m 5s
-
(Locked)
Hash functions7m 38s
-
(Locked)
Digital signatures3m 51s
-
(Locked)
Digital signature standard1m 40s
-
(Locked)
Create a digital certificate4m 55s
-
(Locked)
Revoke a digital certificate1m 41s
-
(Locked)
Certificate stapling2m 29s
-
(Locked)
Certificate authorities6m 13s
-
(Locked)
Certificate subjects3m 35s
-
(Locked)
Certificate types2m 55s
-
(Locked)
Certificate formats2m 30s
-
(Locked)