OWASP Top 10: A3 – Sensitive Data Exposure
Data is one of the most valuable assets to an organization and must be protected in accordance with applicable laws regulations and security standards. In this course youll learn about attacks that compromise sensitive data as well as how to classify sensitive data using a variety of methods. Next youll examine how to hash files in Windows and Linux along with various methods of file encryption for Windows devices. Youll then explore the PKI hierarchy and how to use a certificate to secure a web application with HTTPS. Lastly youll learn how to configure IPsec encrypt cloud storage and mitigate sensitive data attacks.