YoVDO

Maximizing Security with JDK - Understanding Built-in Capabilities

Offered By: Devoxx via YouTube

Tags

Java Security Courses Cryptography Courses Encryption Courses Application Security Courses Hashing Courses Post-Quantum Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the underutilized native security capabilities of the Java Development Kit (JDK) in this 40-minute conference talk. Dive deep into JDK's inherent security features, focusing on cryptographic strengths such as hashing, encryption, and digital signatures. Learn the advantages of using these built-in functions over external dependencies. Discover the latest JDK 21 enhancements, including the Key Encapsulation Mechanism (KEM) API, which aligns with NIST's Post-Quantum Cryptography standards. Watch live coding demonstrations that showcase how JDK's native features simplify development and significantly enhance application security. Gain the knowledge to fully leverage JDK's security offerings for improved efficiency, performance, and robust security in your Java applications.

Syllabus

[VDBUH2024] - Laurențiu Spilcă - Maximizing Security with JDK: Understanding Built-in Capabilities


Taught by

Devoxx

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera