YoVDO

Securely Using Java Cryptography Architecture API

Offered By: OWASP Foundation via YouTube

Tags

Cybersecurity Courses Encryption Courses Application Security Courses Cryptographic Algorithms Courses Secure Coding Courses HMAC Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of securely implementing Java Cryptography Architecture in this 30-minute conference talk from AppSecUSA 2018. Delve into the challenges posed by ambiguous documentation, overwhelming algorithmic choices, insecure defaults, and poor architectural decisions. Learn how to properly utilize various cryptographic primitives, including Random Number Generators, Encryption/Decryption algorithms, HMACs, and digital signatures, through real-world code examples. Examine both flawed and secure implementations to identify common pitfalls and understand best practices. Gain insights on future-proofing cryptographic systems in applications from Mansi Sheth, Principal Security Researcher at CA Veracode, as she shares her expertise in breaking, defending, and building secure applications.

Syllabus

Are we using Java Crypto API Securely ? - Mansi Sheth - AppSecUSA 2018


Taught by

OWASP Foundation

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network