OWASP Top 10: A3 - Sensitive Data Exposure

OWASP    |    Intermediate
  • 17 videos | 1h 48m 20s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 68 users Rating 4.6 of 68 users (68)
Data is one of the most valuable assets to an organization and must be protected in accordance with applicable laws, regulations, and security standards. In this course, you'll learn about attacks that compromise sensitive data, as well as how to classify sensitive data using a variety of methods. Next, you'll examine how to hash files in Windows and Linux, along with various methods of file encryption for Windows devices. You'll then explore the PKI hierarchy and how to use a certificate to secure a web application with HTTPS. Lastly, you'll learn how to configure IPsec, encrypt cloud storage, and mitigate sensitive data attacks.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    List methods by which malicious actors can gain access to sensitive data
    Describe what personally identifiable information (pii) is and how it relates to data classification and security
    List common data privacy standards
    Use microsoft file server resource manager (fsrm) in windows to discover and classify files
    Discover and classify sensitive data using amazon macie
    Enable data loss prevention (dlp) using azure information protection (aip)
    Hash files using windows commands
    Hash files using linux commands
  • Encrypt files in windows using encrypting file system (efs)
    Encrypt files in windows using bitlocker
    Describe the pki hierarchy
    Configure https for a web application
    Enable ipsec to protect lan traffic
    Encrypt cloud storage
    Identify methods by which sensitive data exposure attacks can be mitigated
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 32s
  • 9m 23s
  • Locked
    3.  Personally Identifiable Information
    5m 18s
  • Locked
    4.  Data Privacy Security Standards
    6m 43s
  • Locked
    5.  Classifying Data with Microsoft File Server Resource Manager
    8m 10s
  • Locked
    6.  Classifying Data with Amazon Macie
    6m 52s
  • Locked
    7.  Configuring Azure Information Protection
    6m 37s
  • Locked
    8.  Hashing Files in Windows
    4m 24s
  • Locked
    9.  Hashing Files in Linux
    8m 42s
  • Locked
    10.  Encrypting Data at Rest with Encrypting File System
    6m 59s
  • Locked
    11.  Encrypting Data at Rest with Microsoft BitLocker
    6m 23s
  • Locked
    12.  PKI Certificates
    6m 36s
  • Locked
    13.  Enabling HTTPS for a Web Application
    9m 5s
  • Locked
    14.  Enabling IPsec for LAN Traffic
    8m 20s
  • Locked
    15.  Encrypting Cloud Storage with Key Vault Keys
    6m 54s
  • Locked
    16.  Mitigating Sensitive Data Exposure Attacks
    5m 14s
  • Locked
    17.  Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 119 users Rating 4.6 of 119 users (119)
Rating 4.5 of 276 users Rating 4.5 of 276 users (276)
Rating 4.6 of 1111 users Rating 4.6 of 1111 users (1111)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.4 of 69 users Rating 4.4 of 69 users (69)
Rating 4.6 of 54 users Rating 4.6 of 54 users (54)
Rating 4.6 of 396 users Rating 4.6 of 396 users (396)