Video Description

This lesson covers mitigation, countermeasures and defenses. The defenses section of this lesson talks about protecting sensitive data at rest, data in motion and data in use. Participants also learn about encryption standards, with the emphasis being on "never roll your own," as it is too predictable and not random. Also covered in this lesson is how to minimize man in the middle (MITM) attacks and eavesdropping.

Course Modules

Secure Coding

Instructed By

Instructor Profile Image