Although it appears complicated, cryptography is based on simple mathematics. This course will guide you through the theory and application of cryptography so that you will understand for yourself when it is used incorrectly and how to use it well.
Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted.
In this course, Cryptography Principles for IT Professionals and Developers, you will learn to apply cryptographic algorithms to keep your systems safe.
Here's what you will learn:
First, you will learn the nature of information and see how that understanding directly informs the tools that you choose.
Next, you will apply those tools to protect secrets, documents, and systems under your control.
Finally, you will explore how to create new tools by coding against cryptographic libraries in C# and Java.
When you are finished with this course, you will have the skills and knowledge of cryptography needed to select and apply the correct algorithms to build a complete cryptosystem, and keep your users safe.
What is Cryptography?
Cryptography is a way to secure communication between two parties through the use and study of techniques that block or restrict malicious third parties (aka "adversaries") from accessing the data. In its basic from, cryptography is a set of protocols, or aglorithms, created to keep communications and data private and secure.
What is Cryptography used for?
Modern usage of cryptography range from e-commerce transactions and chip-based card payments to digital currencies and computer passwords.
Who is this Cryptography course for?
This is an intermediate level cryptography course designed specifically for IT professionals and developers who are looking to expand their skillsets into cryptography. Before you begin this course you should have a foundational knowledge of algebra and be comfortable at the command line. Knowledge of either C# or Java will help when we get into the coding excersises.
What you will learn:
How to use the openssl command line tool
When to apply hash, symmetric, and asymmetric algorithms
What goes into a digital certificate
How to use cryptography libraries in both .NET and Java
Mathematician and software developer, Michael L Perry applies formal proof to creating reliable software. He has developed a method starting from the works of the greats (Meyer, Rumbaugh, Knuth), and embodied it in his open-source frameworks (Update Controls and Correspondence).
Course Overview [Autogenerated] Hello, I'm Michael L. Perry. And welcome to cryptography principles for I. T professionals and developers. I'm a software mathematician, meaning that I apply the rigor of mathematics while building software systems, and there is no clearer application than in the study of digital security. Do you know why we use prime numbers in cryptography? It's to do with a 400 year old serum that laid the foundation for the algorithms that protect the internet today. And how do we know that we've sufficiently hidden digital information? That's all based on a 70 year old math paper that gave the world of framework for reasoning about secrecy systems. In this course, we don't shy away from the math. We learned how cryptography works, why it works and how to avoid common mistakes. But we will also see practical examples using the tools that we use every day. Along the way, you learn how to use the open SSL command line tool when to apply hash, symmetric and asymmetric algorithms. What goes into a digital certificate and how to use cryptography libraries in both .NET and Java. When you're done, you'll know how to assemble algorithms to create a complete crypto system for solving your most pressing security problems. Before you begin, you should be comfortable at the command line and have a good foundation in basic algebra. Knowledge of either C# or Java will help when we get to the coding exercises. I really enjoyed going back through some of my favorite math papers in preparation for this course. I hope that you will allow me to be your guide through the fascinating world of information security with cryptography principles for I T professionals and developers at Pluralsight.