Free
CourseOWASP Top 10: Cryptographic Failures
Learn about cryptographic failures, what they are, and how to prevent them.
This course includes
This course includes
Skill level
BeginnerTime to complete
Average based on combined completion rates — individual pacing in lessons, projects, and quizzes may vary<1 hourPrerequisites
None
About this course
OWASP Top 10: Cryptographic Failures covers the second of the 2021 OWASP Top 10 Web Application Security Risks. In this course, we will explore what cryptographic failures are and learn how to identify and prevent them from our system.
Skills you'll gain
Explain cryptographic failures
Identify failures in a program
Remediate program failures
Syllabus
No DIY-ers Here
Learn about cryptographic failures and how to prevent them.
Certificate of completion available with Plus or Pro
Earn a certificate of completion and showcase your accomplishment on your resume or LinkedIn.
Earn a certificate of completion
Show your network you've done the work by earning a certificate of completion for each course or path you finish.- Show proofReceive a certificate that demonstrates you've completed a course or path.
- Build a collectionThe more courses and paths you complete, the more certificates you collect.
- Share with your networkEasily add certificates of completion to your LinkedIn profile to share your accomplishments.
Reviews from learners
- The progress I have made since starting to use codecademy is immense! I can study for short periods or long periods at my own convenience - mostly late in the evenings.ChrisCodecademy Learner @ USA
- I felt like I learned months in a week. I love how Codecademy uses learning by practice and gives great challenges to help the learner to understand a new concept and subject.RodrigoCodecademy Learner @ UK
- Brilliant learning experience. Very interactive. Literally a game changer if you're learning on your own.John-AndrewCodecademy Learner @ USA
Our learners work at
Join over 50 million learners and start OWASP Top 10: Cryptographic Failures today!
Looking for something else?
Related resources
- Article
Resiliency
This article introduces practices for making systems that continue to perform under adverse conditions. - Article
Cryptographic Attacks
Learn about attacks and techniques that bypass cryptography. - Article
Testing Types
In this article, you will be introduced to the different types of testing that may be used throughout the various stages of a project from local development to shipping to real users.
Related courses and paths
- Free course
OWASP Top 10: Software and Data Integrity Failures
You will learn about Software and Data Integrity Failures, what they are, and how to prevent them.Beginner Friendly< 1 hour - Free course
OWASP Top 10: Security Logging and Monitoring Failures
You will learn about Security Logging and Monitoring Failures, what are they, and how to prevent them.Beginner Friendly< 1 hour - Free course
OWASP Top 10: Identification and Authentication Failures
You will learn about Identification and Authentication Failures, what are they, and how to prevent them.Beginner Friendly< 1 hour
Browse more topics
- Code foundations7,340,560 learners enrolled
- Computer science5,796,079 learners enrolled
- Web development4,914,522 learners enrolled
- Data science4,430,728 learners enrolled
- Python3,577,868 learners enrolled
- For business3,306,800 learners enrolled
- JavaScript2,840,270 learners enrolled
- Data analytics2,415,081 learners enrolled
- IT2,365,774 learners enrolled
Unlock additional features with a paid plan
Practice Projects
Guided projects that help you solidify the skills and concepts you're learning.Assessments
Auto-graded quizzes and immediate feedback help you reinforce your skills as you learn.Certificate of Completion
Earn a document to prove you've completed a course or path that you can share with your network.