YoVDO

Maximizing Security with JDK - Understanding Built-in Capabilities

Offered By: Devoxx via YouTube

Tags

Java Security Courses Cryptography Courses Encryption Courses Application Security Courses Hashing Courses Post-Quantum Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the underutilized native security capabilities of the Java Development Kit (JDK) in this 40-minute conference talk. Dive deep into JDK's inherent security features, focusing on cryptographic strengths such as hashing, encryption, and digital signatures. Learn the advantages of using these built-in functions over external dependencies. Discover the latest JDK 21 enhancements, including the Key Encapsulation Mechanism (KEM) API, which aligns with NIST's Post-Quantum Cryptography standards. Watch live coding demonstrations that showcase how JDK's native features simplify development and significantly enhance application security. Gain the knowledge to fully leverage JDK's security offerings for improved efficiency, performance, and robust security in your Java applications.

Syllabus

[VDBUH2024] - Laurențiu Spilcă - Maximizing Security with JDK: Understanding Built-in Capabilities


Taught by

Devoxx

Related Courses

Data Structures: An Active Learning Approach
University of California, San Diego via edX
Blockchain Basics
University at Buffalo via Coursera
Intro to Data Structures and Algorithms
Google via Udacity
Introduction to Blockchain Technologies
INSEAD via Coursera
Data Structures
CEC via Swayam