MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Cryptography Fundamentals for Java and .NET Developers

Course Summary

The Java and .NET frameworks contain all the algorithms you need to keep your users' data secret from prying eyes. Web servers like Apache, Tomcat, and IIS, combined with tools like OpenSSL, keep your users secure online. But to use these tools correctly,


  • +

    Course Syllabus

    ● History of Cryptography
        ◦ Introduction
        ◦ One-Time Pads
        ◦ Entropy
        ◦ The Enigma Machine
        ◦ Cryptanalysis
        ◦ Diffie-Hellman
        ◦ Diffie-Hellman Example
        ◦ Conclusion
    ● Algorithms
        ◦ Introduction
        ◦ Block Ciphers
        ◦ Confusion and Key Schedules
        ◦ Diffusion and Cipher Block Chaining
        ◦ Initialization Vectors
        ◦ DES
        ◦ AES
        ◦ Modern Cryptanalysis
        ◦ Compression and Error Correction
        ◦ Public and Private Keys
        ◦ Inverse Exponents Example
        ◦ Finding Inverse Exponents
        ◦ The RSA Algorithm
        ◦ Patterns in RSA
        ◦ Discrete Logarithm Problem
        ◦ Elliptic Curve
        ◦ Digital Signatures
        ◦ Hashing Algorithms
        ◦ Birthday Attack
        ◦ Trust
        ◦ Summary
    ● APIs
        ◦ Symmetric Java APIs
        ◦ AES in Java
        ◦ Asymmetric Java APIs
        ◦ RSA in Java
        ◦ Bouncy Castle for Java
        ◦ .NET Crypto API
        ◦ AES in .NET
        ◦ RSA in .NET
        ◦ Summary
    ● Transport Layer Security
        ◦ X.509 Certificates
        ◦ RSA Key Pair
        ◦ Certificate Signing Request
        ◦ Personal Information Exchange
        ◦ IIS
        ◦ Tomcat
        ◦ Naked Keys
        ◦ Apache
        ◦ Summary
    ● Authentication and Authorization
        ◦ Passwords
        ◦ Hashed Passwords
        ◦ Rainbow Tables
        ◦ Salted Hashed Passwords
        ◦ Computing Password Entropy
        ◦ Password Based Key Derivation Functions
        ◦ Progressive Salted Hashed Passwords
        ◦ Federation
        ◦ Kerberos
        ◦ WS-Trust and WS-Federation
        ◦ XML Signature Wrapping Attacks
        ◦ OAuth
        ◦ OpenID Connect
        ◦ Conclusion
    ● Case Studies
        ◦ Snapchat
        ◦ Safari
        ◦ Heartbleed
        ◦ Target
        ◦ NSA
        ◦ Lessons Learned
    ● Decentralized Systems
        ◦ PGP
        ◦ Establishing Trust
        ◦ Hashcash
        ◦ Bitcoin
        ◦ Proof of Work
        ◦ Conflict Resolution
        ◦ Mining
        ◦ Freenet
        ◦ Untrusted Networks
        ◦ Conclusion
        

     


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top