OWASP Top 10: A3 – Sensitive Data Exposure
Data is one of the most valuable assets to an organization and must be protected in accordance with applicable laws regulations and security standards. In this course you ll learn about attacks that compromise sensitive data as well as how to classify sensitive data using a variety of methods. Next you ll examine how to hash files in Windows and Linux along with various methods of file encryption for Windows devices. You ll then explore the PKI hierarchy and how to use a certificate to secure a web application with HTTPS. Lastly you ll learn how to configure IPsec encrypt cloud storage and mitigate sensitive data attacks.