Although it appears complicated, cryptography is based on simple mathematics. This course will guide you through the theory and application of cryptography so that you will understand for yourself when it is used incorrectly and how to use it well.
Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted. In this course, Cryptography Principles for IT Professionals and Developers, you will learn to apply cryptographic algorithms to keep your systems safe. First, you will learn the nature of information and see how that understanding directly informs the tools that you choose. Next, you will apply those tools to protect secrets, documents, and systems under your control. Finally, you will explore how to create new tools by coding against cryptographic libraries in C# and Java. When you are finished with this course, you will have the skills and knowledge of cryptography needed to select and apply the correct algorithms to build a complete cryptosystem, and keep your users safe.
Mathematician and software developer, Michael L Perry applies formal proof to creating reliable software. He has developed a method starting from the works of the greats (Meyer, Rumbaugh, Knuth), and embodied it in his open-source frameworks (Update Controls and Correspondence).
Course Overview [Autogenerated] Hello, I'm Michael L. Perry. And what come to cryptography principles for I t professionals and developers. I'm a software mathematician, meaning that I apply the rigor of mathematics while building software systems, and there is no clearer application than in the study of digital security. Do you know why we use prime numbers in cryptography? It's to do with a 400 year old serum that laid the foundation for the algorithms that protect the Internet today. And how do we know that we've sufficiently hidden digital information? That's all based on a 70 year old math paper that gave the world a framework for reasoning about secrecy systems. In this course, we don't shy away from the math. We learned how cryptography works, why it works and how to avoid common mistakes. But we will also see practical examples using the tools that we use every day. Along the way, you learn how to use the open SSL command line tool when to apply hash, symmetric and asymmetric algorithms. What goes into a digital certificate and how to use cryptography libraries in both dot net and java. When you're done, you'll know how to assemble algorithms to create a complete crypto system for solving your most pressing security problems. Before you begin, you should be comfortable that the command line and have a good foundation in basic algebra knowledge of either C Sharp or Java will help when we get to the coding exercises. I really enjoyed going back through some of my favorite math papers in preparation for this course healthy to allow me to be your guide through the fascinating World of information security with cryptography principles for I T. Professionals and developers at plural site.