• Online, Self-Paced
Course Description

Data is one of the most valuable assets to an organization and must be protected in accordance with applicable laws, regulations, and security standards.

In this course, learn about cryptographic failure attacks that compromise sensitive data and how to classify sensitive data. Next, examine how to hash files in Windows and Linux and encrypt files for Windows devices. Then, explore the public key infrastructure (PKI) hierarchy and learn how to use a certificate to secure a web application with HTTPS. Finally, learn how to configure IPsec, encrypt cloud storage, and mitigate sensitive data attacks.

Upon completion, you'll be able to protect sensitive data with security controls and classify and encrypt data at rest.

Learning Objectives

{"discover the key concepts covered in this course"}

Framework Connections

  • Cyber Defense Analysis
  • Cybersecurity Management
  • Vulnerability Assessment and Management