YoVDO

Maximizing Security with JDK - Understanding Built-in Capabilities

Offered By: Devoxx via YouTube

Tags

Java Security Courses Cryptography Courses Encryption Courses Application Security Courses Hashing Courses Post-Quantum Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the underutilized native security capabilities of the Java Development Kit (JDK) in this 40-minute conference talk. Dive deep into JDK's inherent security features, focusing on cryptographic strengths such as hashing, encryption, and digital signatures. Learn the advantages of using these built-in functions over external dependencies. Discover the latest JDK 21 enhancements, including the Key Encapsulation Mechanism (KEM) API, which aligns with NIST's Post-Quantum Cryptography standards. Watch live coding demonstrations that showcase how JDK's native features simplify development and significantly enhance application security. Gain the knowledge to fully leverage JDK's security offerings for improved efficiency, performance, and robust security in your Java applications.

Syllabus

[VDBUH2024] - Laurențiu Spilcă - Maximizing Security with JDK: Understanding Built-in Capabilities


Taught by

Devoxx

Related Courses

Hardening Java's Access Control by Abolishing Implicit Privilege Elevation
IEEE via YouTube
BaRMIe - Poking Java’s Back Door
44CON Information Security Conference via YouTube
Penetration Testing Considered Harmful
44CON Information Security Conference via YouTube
New Exploit Technique in Java Deserialization Attack
Black Hat via YouTube
An In-Depth Study of More Than Ten Years of Java Exploitation
Association for Computing Machinery (ACM) via YouTube