SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsA typical coding pattern is seen in online service APIs that make authentication decisions based on X509 certificate thumbprint comparisons. Typically, the thumbprint provided by the language runtime returns a SHA-1 hash for the certificate, but was not SHA-1 deprecated some years ago because of security concerns?