Cryptography Principles for IT Professionals and Developers
Although it appears complicated, cryptography is based on simple mathematics. This course will guide you through the theory and application of cryptography so that you will understand for yourself when it is used incorrectly and how to use it well.
Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted.
In this course, Cryptography Principles for IT Professionals and Developers, you will learn to apply cryptographic algorithms to keep your systems safe.
Here’s what you will learn:
Author Name: Michael Perry
Author Description:
Software is math. Michael L Perry has built upon the works of mathematicians like Bertrand Meyer, James Rumbaugh, and Donald Knuth to develop a mathematical system for software development. He has captured this system in a set of open source projects, Update Controls and Correspondence. As a Principal Consultant at Improving Enterprises, he applies mathematical concepts to building scalable and robust enterprise systems. You can find out more at qedcode.com.
Table of Contents
- Course Overview
1min - Hashing
25mins - Symmetric Encryption
29mins - Block Ciphers
17mins - Asymmetric Encryption
25mins - Public Key Infrastructure
40mins - Certificates
20mins - Coding Cryptosystems in .NET and Java
42mins
There are no reviews yet.