This course explores vulnerabilities caused by improper cryptographic implementations or lack of encryption, leading to sensitive data exposure. You’ll learn how attackers exploit weak cryptography and how to securely protect secrets, passwords, and sensitive information.
Overview
Syllabus
- Unit 1: Introduction to Cryptographic Failures
- Unit 2: Hardcoded Secrets in Source Code
- Discovering Hardcoded Secrets
- Securing Secrets with Environment Variables
- Protect Your Environment Variables
- Finding and Securing Secret Keys
- Unit 3: Insecure Password Hashing
- Exposing Hash Vulnerabilities
- Enhance Encryption with BCrypt
- Complete the Authentication Flow
- Unit 4: Automatic Database Encryption
- Database Encryption Vulnerability Test
- Creating the Hashing Utility
- Securely Handle Credit Card Data
- Verify Card Number Securely