OWASP Top 10: A02:2021-Cryptographic Failures

placeholder

Data is one of the most valuable assets to an organization and must be protected in accordance with applicable laws regulations and security standards. In this course learn about cryptographic failure attacks that compromise sensitive data and how to classify sensitive data. Next examine how to hash files in Windows and Linux and encrypt files for Windows devices. Then explore the public key infrastructure (PKI) hierarchy and learn how to use a certificate to secure a web application with HTTPS. Finally learn how to configure IPsec encrypt cloud storage and mitigate sensitive data attacks. Upon completion youll be able to protect sensitive data with security controls and classify and encrypt data at rest.