YoVDO

Maximizing Security with JDK - Understanding Built-in Capabilities

Offered By: Devoxx via YouTube

Tags

Java Security Courses Cryptography Courses Encryption Courses Application Security Courses Hashing Courses Post-Quantum Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the underutilized native security capabilities of the Java Development Kit (JDK) in this 40-minute conference talk. Dive deep into JDK's inherent security features, focusing on cryptographic strengths such as hashing, encryption, and digital signatures. Learn the advantages of using these built-in functions over external dependencies. Discover the latest JDK 21 enhancements, including the Key Encapsulation Mechanism (KEM) API, which aligns with NIST's Post-Quantum Cryptography standards. Watch live coding demonstrations that showcase how JDK's native features simplify development and significantly enhance application security. Gain the knowledge to fully leverage JDK's security offerings for improved efficiency, performance, and robust security in your Java applications.

Syllabus

[VDBUH2024] - Laurențiu Spilcă - Maximizing Security with JDK: Understanding Built-in Capabilities


Taught by

Devoxx

Related Courses

Assets, Threats, and Vulnerabilities
Google via Coursera
Blockchain Basics
University at Buffalo via Coursera
Data Security for Web Developers
Codio via Coursera
Cryptography
(ISC)² via Coursera
Password Cracking Tool Fundamentals
Cybrary