In this course, you will learn how to mitigate the risks associated with lack of encryption or access control of sensitive data anywhere within the ecosystem, including at rest, in transit, or during processing.
On successful completion of this course, learners should have the knowledge and skills to:
- Identify missing encryption
- Recognize the potential impact of missing encryption
- Apply best practices for mitigating missing encryption