Free
CourseOWASP Top 10: Cryptographic Failures
Learn about cryptographic failures, what they are, and how to prevent them.
This course includes
This course includes
Skill level
BeginnerTime to complete
Average based on combined completion rates — individual pacing in lessons, projects, and quizzes may vary<1 hourPrerequisites
None
About this course
OWASP Top 10: Cryptographic Failures covers the second of the 2021 OWASP Top 10 Web Application Security Risks. In this course, we will explore what cryptographic failures are and learn how to identify and prevent them from our system.
Skills you'll gain
Explain cryptographic failures
Identify failures in a program
Remediate program failures
Syllabus
No DIY-ers Here
Learn about cryptographic failures and how to prevent them.
Certificate of completion available with Plus or Pro
Earn a certificate of completion and showcase your accomplishment on your resume or LinkedIn.
Earn a certificate of completion
Show your network you've done the work by earning a certificate of completion for each course or path you finish.- Show proofReceive a certificate that demonstrates you've completed a course or path.
- Build a collectionThe more courses and paths you complete, the more certificates you collect.
- Share with your networkEasily add certificates of completion to your LinkedIn profile to share your accomplishments.
Reviews from learners
- The progress I have made since starting to use codecademy is immense! I can study for short periods or long periods at my own convenience - mostly late in the evenings.ChrisCodecademy Learner @ USA
- I felt like I learned months in a week. I love how Codecademy uses learning by practice and gives great challenges to help the learner to understand a new concept and subject.RodrigoCodecademy Learner @ UK
- Brilliant learning experience. Very interactive. Literally a game changer if you're learning on your own.John-AndrewCodecademy Learner @ USA
Our learners work at
Join over 50 million learners and start OWASP Top 10: Cryptographic Failures today!
Looking for something else?
Related resources
- Article
Resiliency
This article introduces practices for making systems that continue to perform under adverse conditions. - Article
Cryptographic Attacks
Learn about attacks and techniques that bypass cryptography. - Article
All about the Secure Software Development Lifecycle (SSDLC)
Learn how to secure applications using the Secure Development Lifecycle (SDLC). Explore key phases, cloud security strategies, and DevSecOps best practices for building secure software.
Related courses and paths
- You will learn about Software and Data Integrity Failures, what they are, and how to prevent them.
- Beginner Friendly.< 1 hour
- You will learn about Security Logging and Monitoring Failures, what are they, and how to prevent them.
- Beginner Friendly.< 1 hour
- You will learn about Identification and Authentication Failures, what are they, and how to prevent them.
- Beginner Friendly.< 1 hour
Browse more topics
- Code foundations8,476,671 learners enrolled
- Computer science6,968,706 learners enrolled
- Web development5,687,448 learners enrolled
- Data science5,281,945 learners enrolled
- Python4,270,743 learners enrolled
- For business4,070,869 learners enrolled
- JavaScript3,191,234 learners enrolled
- Data analytics3,175,320 learners enrolled
- IT3,122,278 learners enrolled
Unlock additional features with a paid plan
Practice Projects
Guided projects that help you solidify the skills and concepts you're learning.Assessments
Auto-graded quizzes and immediate feedback help you reinforce your skills as you learn.Certificate of Completion
Earn a document to prove you've completed a course or path that you can share with your network.







