Cryptography Principles for IT Professionals and Developers
Offered By: Pluralsight
Course Description
Overview
Cryptographic algorithms are based on simple mathematics. In this cryptography course you will learn the theory and application of cryptography, how to use it well and how to tell when it is used incorrectly.
Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted. In this course, Cryptography Principles for IT Professionals and Developers, you will learn to apply cryptographic algorithms to keep your systems safe. First, you will learn the nature of information and see how that understanding directly informs the tools that you choose. Next, you will apply those tools to protect secrets, documents, and systems under your control. Finally, you will explore how to create new tools by coding against cryptographic libraries in C# and Java. When you are finished with this course, you will have the skills and knowledge of cryptography needed to select and apply the correct algorithms to build a complete cryptosystem, and keep your users safe.
Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted. In this course, Cryptography Principles for IT Professionals and Developers, you will learn to apply cryptographic algorithms to keep your systems safe. First, you will learn the nature of information and see how that understanding directly informs the tools that you choose. Next, you will apply those tools to protect secrets, documents, and systems under your control. Finally, you will explore how to create new tools by coding against cryptographic libraries in C# and Java. When you are finished with this course, you will have the skills and knowledge of cryptography needed to select and apply the correct algorithms to build a complete cryptosystem, and keep your users safe.
Taught by
Michael Perry
Related Courses
Certified Ethical Hacker (CEH) - Linux Academy's Prep CourseA Cloud Guru Certified Information Systems Security Professional (CISSP)
A Cloud Guru CompTIA Security+ Certification Prep
A Cloud Guru Encryption Fundamentals
A Cloud Guru LPIC-3 Exam 303: Security
A Cloud Guru