5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

IT Professional Curricula     Internet and Network Technologies Solution Area     Security Solutions     OWASP Top 10 2020
Data is one of the most valuable assets to an organization and must be protected in accordance with applicable laws, regulations, and security standards. In this course, you'll learn about attacks that compromise sensitive data, as well as how to classify sensitive data using a variety of methods. Next, you'll examine how to hash files in Windows and Linux, along with various methods of file encryption for Windows devices. You'll then explore the PKI hierarchy and how to use a certificate to secure a web application with HTTPS. Lastly, you'll learn how to configure IPsec, encrypt cloud storage, and mitigate sensitive data attacks.

Objectives

OWASP Top 10: A3 - Sensitive Data Exposure

  • discover the key concepts covered in this course
  • list methods by which malicious actors can gain access to sensitive data
  • describe what Personally Identifiable Information (PII) is and how it relates to data classification and security
  • list common data privacy standards
  • use Microsoft File Server Resource Manager (FSRM) in Windows to discover and classify files
  • discover and classify sensitive data using Amazon Macie
  • enable Data Loss Prevention (DLP) using Azure Information Protection (AIP)
  • hash files using Windows commands
  • hash files using Linux commands
  • encrypt files in Windows using Encrypting File System (EFS)
  • encrypt files in Windows using BitLocker
  • describe the PKI hierarchy
  • configure HTTPS for a web application
  • enable IPsec to protect LAN traffic
  • encrypt cloud storage
  • identify methods by which sensitive data exposure attacks can be mitigated
  • summarize the key concepts covered in this course