Category Archives: Uncategorized
MCPA MuleSoft Certified Platform Architect Level 1 – Designing Effective APIs Part 3
4. Backend Systems Abstraction Hi. In this lecture, let us discuss about abstracting the back end systems. Okay? So the best practice that we should follow as part of this API three layer architecture is we should always abstract the back end systems. So all the components should fit in the three layers, and the… Read More »
MCPA MuleSoft Certified Platform Architect Level 1 – Designing Effective APIs Part 2
3. API Data Models Hi. In this lecture, let us discuss about the API data modeling. So, what is this API data model? The API data model is nothing but the data structure that is exchanged between the parties. So when I say parties, I mean like the data structure that is exchanged between the… Read More »
MCPA MuleSoft Certified Platform Architect Level 1 – Designing Effective APIs
1. API Design Hi. Welcome to the new section. In this course. In this section, we will be discussing how to design effective APIs. And the objectives of this section are we will understand the importance of the contract first APA design and the RAML fragments. And then we will also move on and understand… Read More »
ISACA CISM – Domain 03 – Information Security Program Development part 14
106. Compliance Monitoring and Enforcement Part2 So as we talk about compliance monitoring and enforcement, one of the things I think I was trying to get to is the standards. Compliance, those are the boundaries of options for your systems, processes and actions that are within your policy. Really if you think about it, if… Read More »
ISACA CISM – Domain 03 – Information Security Program Development part 13
98. IS Liaison Responsibilities Part2 So as we continue to look at some of the other liaisons that you’d work with, obviously there would be one in the training world. In the training world, besides initial orientation, we should be making sure that we are working with training to make everybody understand what security is… Read More »
ISACA CISM – Domain 03 – Information Security Program Development part 12
88. Metrics So as we’re looking at the metrics, there are a number of considerations of things we should think about when we are creating metrics. In other words, there are some attributes we want to look at when we’re deciding what is going to be a metric, what is it we’re going to measure?… Read More »
ISACA CISM – Domain 03 – Information Security Program Development part 11
81. Managing Complexity Part1 One of the things you can say though, in today’s world is that there’s a lot of complexity within the infrastructure. As the business environments grow, many of your business processes and support functions are going to have to integrate quite seamlessly to be effective. That can be seen as again… Read More »
ISACA CISM – Domain 03 – Information Security Program Development Part 10
73. Third-party Service Providers Part1 We also have to address the thirdparty service provider. Now, they may again provide you partial or complete business processes or services. It’s just a matter of maybe where your resources were lacking that you had to bring in a third party to help out. Now, as such, we need… Read More »
ISACA CISM – Domain 03 – Information Security Program Development Part 9
64. Other Actions All right, so there are some other actions that we can take, things that we do to kind of verify this entire set of getting to compliance. We do things like conducting a vulnerability analysis. A lot of times that’s just an automated process software that’s going to check different types of… Read More »
ISACA CISM – Domain 03 – Information Security Program Development Part 8
58. Personnel Part2 Now remember, the skills are really the training, the expertise and experience of that person. Now, this is often a given of a job function. We expect that you have certain skills to perform a certain job, but skills can be gained. They can be gained through training or on the job… Read More »