Maximizing Security with JDK - Understanding Built-in Capabilities
Offered By: Devoxx via YouTube
Course Description
Overview
Explore the underutilized native security capabilities of the Java Development Kit (JDK) in this 40-minute conference talk. Dive deep into JDK's inherent security features, focusing on cryptographic strengths such as hashing, encryption, and digital signatures. Learn the advantages of using these built-in functions over external dependencies. Discover the latest JDK 21 enhancements, including the Key Encapsulation Mechanism (KEM) API, which aligns with NIST's Post-Quantum Cryptography standards. Watch live coding demonstrations that showcase how JDK's native features simplify development and significantly enhance application security. Gain the knowledge to fully leverage JDK's security offerings for improved efficiency, performance, and robust security in your Java applications.
Syllabus
[VDBUH2024] - Laurențiu Spilcă - Maximizing Security with JDK: Understanding Built-in Capabilities
Taught by
Devoxx
Related Courses
Hardening Java's Access Control by Abolishing Implicit Privilege ElevationIEEE via YouTube BaRMIe - Poking Java’s Back Door
44CON Information Security Conference via YouTube Penetration Testing Considered Harmful
44CON Information Security Conference via YouTube New Exploit Technique in Java Deserialization Attack
Black Hat via YouTube An In-Depth Study of More Than Ten Years of Java Exploitation
Association for Computing Machinery (ACM) via YouTube