Protecting Sensitive Data From Exposure in ASP.NET and ASP.NET Core Applications
Offered By: Pluralsight
Course Description
Overview
Keeping personal, financial, or other sensitive data secure from theft or exposure takes active management. This course will teach you how to identify sensitive data in your applications and the protection measures that can be used to keep it secure.
Unprotected sensitive data is one of the top vulnerabilities facing applications today. In this course, Protecting Sensitive Data From Exposure in ASP.NET and ASP.NET Core Applications, you'll learn how to prevent attackers exploiting personal information, passwords, credit card numbers, or other sensitive data. First, you'll learn how to classify your data, determining what is potentially sensitive. Next, you'll discover the protection controls you need to consider when working with sensitive data. Finally, you'll explore how cryptographic and tokenization techniques can help keep this data safe while remaining usable. When you're finished with this course, you'll have the skills and knowledge needed to protect your system's sensitive data from potential exposure.
Unprotected sensitive data is one of the top vulnerabilities facing applications today. In this course, Protecting Sensitive Data From Exposure in ASP.NET and ASP.NET Core Applications, you'll learn how to prevent attackers exploiting personal information, passwords, credit card numbers, or other sensitive data. First, you'll learn how to classify your data, determining what is potentially sensitive. Next, you'll discover the protection controls you need to consider when working with sensitive data. Finally, you'll explore how cryptographic and tokenization techniques can help keep this data safe while remaining usable. When you're finished with this course, you'll have the skills and knowledge needed to protect your system's sensitive data from potential exposure.
Syllabus
- Course Overview 1min
- Identifying Sensitive Data in Applications 13mins
- Preventing Common Web Application Vulnerabilities 28mins
- Protecting Stored Data Using Cryptography 35mins
- Protecting Stored Data Using Data Tokenization 12mins
Taught by
Matt Tester
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography II
Stanford University via Coursera Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera Cryptography I
Stanford University via Coursera Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera