Defensive Programmer: Cryptography


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

This 8-video course helps learners explore the basics of programming cryptography, cryptography types, and applications, and also examines encryption implementation code examples. In the first of two tutorials on encryption concepts, you will explore the critical concepts of symmetric versus asymmetric cryptography, and when to use one as opposed to another, by learning the benefits of one over the other. In the second tutorial, learners will continue by examining specific algorithms such as AES, DES, RSA, Diffie-Hellman, and Elliptic Curve, and by looking into the strengths and weaknesses of these particular algorithms. Next, you will take a careful look at the important concepts of confidentiality and integrity, the use of hash codes, message authentication codes, and HMACs (hash message authentication codes). In the final four tutorials in this course, learners will explore specific code samples, where one can see Java cryptography, Python cryptography, C# cryptography, and Javascript cryptography being implemented.



Expected Duration (hours)
0.5

Lesson Objectives

Defensive Programmer: Cryptography

  • discover the key concepts covered in this course
  • describe basic cryptography concepts, cryptography types, and applications
  • describe basic cryptography applications to confidentiality and integrity
  • use Java Cryptography
  • use Python Cryptography
  • use C# Cryptography
  • use JavaScript Cryptography
  • summarize the key concepts covered in this course
  • Course Number:
    it_spdfpgdj_03_enus

    Expertise Level
    Beginner