DES 275 – OWASP M5: Mitigating Insufcient Cryptography
COURSE OVERVIEW
In this course, you will learn how to mitigate the risks associated with Insufcient Cryptography which includes threat agents such as anyone with physical access to data that has been encrypted improperly, or mobile malware acting on an adversary’s behalf.
After completing this course you will be able to:
- Identify the most common security aws in mobile apps related to insufcient cryptography
- Understand how an attacker might exploit such vulnerabilities in your software
- Eliminate or mitigate exposure to these common security threats
COURSE DETAILS
Course Number: DES 275
Course Duration: 12 minutes
Course CPE Credits: 25
Related Subject Matter
CWE
NICE
NIST
Penetration Testing
Foreign Languages Available:
English
COURSE OVERVIEW
In this course, you will learn how to mitigate the risks associated with Insufcient Cryptography which includes threat agents such as anyone with physical access to data that has been encrypted improperly, or mobile malware acting on an adversary’s behalf.
After completing this course you will be able to:
- Identify the most common security aws in mobile apps related to insufcient cryptography
- Understand how an attacker might exploit such vulnerabilities in your software
- Eliminate or mitigate exposure to these common security threats
COURSE DETAILS
Course Number: DES 275
Course Duration: 12 minutes
Course CPE Credits: 25
Related Subject Matter
CWE
NICE
NIST
Penetration Testing
Foreign Languages Available:
English