YoVDO

Securely Using Java Cryptography Architecture API

Offered By: OWASP Foundation via YouTube

Tags

Cybersecurity Courses Encryption Courses Application Security Courses Cryptographic Algorithms Courses Secure Coding Courses HMAC Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of securely implementing Java Cryptography Architecture in this 30-minute conference talk from AppSecUSA 2018. Delve into the challenges posed by ambiguous documentation, overwhelming algorithmic choices, insecure defaults, and poor architectural decisions. Learn how to properly utilize various cryptographic primitives, including Random Number Generators, Encryption/Decryption algorithms, HMACs, and digital signatures, through real-world code examples. Examine both flawed and secure implementations to identify common pitfalls and understand best practices. Gain insights on future-proofing cryptographic systems in applications from Mansi Sheth, Principal Security Researcher at CA Veracode, as she shares her expertise in breaking, defending, and building secure applications.

Syllabus

Are we using Java Crypto API Securely ? - Mansi Sheth - AppSecUSA 2018


Taught by

OWASP Foundation

Related Courses

Web Authentication With Golang - Google's Go Language
Udemy
Jupyter Hub - Teaching Crypto - Hashing
Bill Buchanan OBE via YouTube
API Abuse through Mobile Apps - New Attacks, New Defenses
RSA Conference via YouTube
Preventing Mobile App and API Abuse
OWASP Foundation via YouTube
Authentication as a Microservice - Portable Customer Identity Management
OWASP Foundation via YouTube