Cryptography in .NET 6
Offered By: Pluralsight
Course Description
Overview
In this course, you will learn how to use .NET 6 to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication.
As a software developer, you have a duty to your employer to secure and protect their data. In this course, Cryptography in .NET 6, you will learn how to use the .NET Class Libraries to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication in your applications. First, you will explore random numbers and understand why they are so important to cryptography. Next, you will look at symmetric and asymmetric encryption, and see how they can work together to overcome each of their downsides. Then, you will explore hashing and authenticated hashing and see how they help satisfy integrity and authentication requirements. Finally, you will learn about digital signatures and how they satisfy the non-repudiation requirements. When you are finished with this course, you will have the knowledge of building up a working sample application that simulates a 2-way chat system between recipients. You will incorporate all the building blocks covered in the course to create a hybrid encryption-based example that shows you how everything works together when building larger protocols.
As a software developer, you have a duty to your employer to secure and protect their data. In this course, Cryptography in .NET 6, you will learn how to use the .NET Class Libraries to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication in your applications. First, you will explore random numbers and understand why they are so important to cryptography. Next, you will look at symmetric and asymmetric encryption, and see how they can work together to overcome each of their downsides. Then, you will explore hashing and authenticated hashing and see how they help satisfy integrity and authentication requirements. Finally, you will learn about digital signatures and how they satisfy the non-repudiation requirements. When you are finished with this course, you will have the knowledge of building up a working sample application that simulates a 2-way chat system between recipients. You will incorporate all the building blocks covered in the course to create a hybrid encryption-based example that shows you how everything works together when building larger protocols.
Syllabus
- Course Overview 2mins
- Introduction 10mins
- Cryptographic Random Numbers 10mins
- Symmetric Encryption 45mins
- Asymmetric Encryption 31mins
- Hashing Algorithms 40mins
- Secure Password Storage 18mins
- Digital Signatures 25mins
- Course Summary 5mins
Taught by
Stephen Haunts
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Introduction to Encryption and Cryptography
Raspberry Pi Foundation via FutureLearn Information Security - Authentication and Access Control
New York University (NYU) via edX Practical Encryption and Cryptography Using Python
Pluralsight CompTIA Network+ (N10-007) Cert Prep: 5 Securing TCP/IP
LinkedIn Learning