OWASP Top 10: A02:2021-Cryptographic Failures

OWASP    |    Intermediate
  • 14 videos | 1h 26m 38s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Data is one of the most valuable assets to an organization and must be protected in accordance with applicable laws, regulations, and security standards. In this course, learn about cryptographic failure attacks that compromise sensitive data and how to classify sensitive data. Next, examine how to hash files in Windows and Linux and encrypt files for Windows devices. Then, explore the public key infrastructure (PKI) hierarchy and learn how to use a certificate to secure a web application with HTTPS. Finally, learn how to configure IPsec, encrypt cloud storage, and mitigate sensitive data attacks. Upon completion, you'll be able to protect sensitive data with security controls and classify and encrypt data at rest.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List methods by which malicious actors can gain access to sensitive data
    Outline the pki hierarchy
    Identify what personally identifiable information (pii) is and how it relates to data classification and security
    Name common data privacy standards
    Use microsoft file server resource manager (fsrm) in windows to classify files
    Classify sensitive data using amazon macie
  • Encrypt files in windows using encrypting file system (efs)
    Encrypt files in windows using bitlocker
    Capture cleartext http credentials using wireshark
    Enable https for a web application
    Enable ipsec to protect lan traffic
    Encrypt cloud storage with key vault keys
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 45s
  • 9m 2s
  • Locked
    3.  Public Key Infrastructure (PKI)
    6m 51s
  • Locked
    4.  Personally Identifiable Information (PII)
    5m 5s
  • Locked
    5.  Data Privacy Security Standards
    6m 12s
  • Locked
    6.  Using Microsoft File Server Resource Manager (FSRM)
    10m 14s
  • Locked
    7.  Classifying Data with Amazon Macie
    7m 3s
  • Locked
    8.  Encrypting Data with Encrypting File System (EFS)
    6m 2s
  • Locked
    9.  Encrypting Data at Rest with Microsoft BitLocker
    6m 27s
  • Locked
    10.  Capturing HTTP Cleartext Credentials
    5m 54s
  • Locked
    11.  Enabling HTTPS for a Web Application
    7m 5s
  • Locked
    12.  Enabling IPsec for LAN Traffic
    8m 51s
  • Locked
    13.  Encrypting Cloud Storage with Key Vault Keys
    5m 53s
  • Locked
    14.  Course Summary
    1m 14s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.8 of 16 users Rating 4.8 of 16 users (16)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)
Rating 4.6 of 893 users Rating 4.6 of 893 users (893)
Rating 4.6 of 196 users Rating 4.6 of 196 users (196)