Expanded

Cryptography Principles for IT Professionals and Developers

Although it appears complicated, cryptography is based on simple mathematics. This course will guide you through the theory and application of cryptography so that you will understand for yourself when it is used incorrectly and how to use it well.
Course info
Rating
(24)
Level
Intermediate
Updated
Sep 4, 2020
Duration
3h 23m
Table of contents
Course Overview
Hashing
Symmetric Encryption
Block Ciphers
Asymmetric Encryption
Public Key Infrastructure
Certificates
Coding Cryptosystems in .NET and Java
Description
Course info
Rating
(24)
Level
Intermediate
Updated
Sep 4, 2020
Duration
3h 23m
Description

Cryptography is at the heart of all information security, from administering infrastructure to writing secure code. To be effective, you need to understand how cryptography works and how far it can be trusted.

In this course, Cryptography Principles for IT Professionals and Developers, you will learn to apply cryptographic algorithms to keep your systems safe.

Here's what you will learn:

  • First, you will learn the nature of information and see how that understanding directly informs the tools that you choose.
  • Next, you will apply those tools to protect secrets, documents, and systems under your control.
  • Finally, you will explore how to create new tools by coding against cryptographic libraries in C# and Java.

When you are finished with this course, you will have the skills and knowledge of cryptography needed to select and apply the correct algorithms to build a complete cryptosystem, and keep your users safe.
Course FAQ
Course FAQ
What is Cryptography?

Cryptography is a way to secure communication between two parties through the use and study of techniques that block or restrict malicious third parties (aka "adversaries") from accessing the data. In its basic from, cryptography is a set of protocols, or aglorithms, created to keep communications and data private and secure.

What is Cryptography used for?

Modern usage of cryptography range from e-commerce transactions and chip-based card payments to digital currencies and computer passwords.

Who is this Cryptography course for?

This is an intermediate level cryptography course designed specifically for IT professionals and developers who are looking to expand their skillsets into cryptography. Before you begin this course you should have a foundational knowledge of algebra and be comfortable at the command line. Knowledge of either C# or Java will help when we get into the coding excersises.

What you will learn:
  1. How to use the openssl command line tool
  2. When to apply hash, symmetric, and asymmetric algorithms
  3. What goes into a digital certificate
  4. How to use cryptography libraries in both .NET and Java
About the author
About the author

Mathematician and software developer, Michael L Perry applies formal proof to creating reliable software. He has developed a method starting from the works of the greats (Meyer, Rumbaugh, Knuth), and embodied it in his open-source frameworks (Update Controls and Correspondence).

More from the author
Fundamentals of Distributed Systems
Intermediate
3h 13m
Feb 1, 2021
More courses by Michael Perry
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hello, I'm Michael L. Perry. And welcome to cryptography principles for I. T professionals and developers. I'm a software mathematician, meaning that I apply the rigor of mathematics while building software systems, and there is no clearer application than in the study of digital security. Do you know why we use prime numbers in cryptography? It's to do with a 400 year old serum that laid the foundation for the algorithms that protect the internet today. And how do we know that we've sufficiently hidden digital information? That's all based on a 70 year old math paper that gave the world of framework for reasoning about secrecy systems. In this course, we don't shy away from the math. We learned how cryptography works, why it works and how to avoid common mistakes. But we will also see practical examples using the tools that we use every day. Along the way, you learn how to use the open SSL command line tool when to apply hash, symmetric and asymmetric algorithms. What goes into a digital certificate and how to use cryptography libraries in both .NET and Java. When you're done, you'll know how to assemble algorithms to create a complete crypto system for solving your most pressing security problems. Before you begin, you should be comfortable at the command line and have a good foundation in basic algebra. Knowledge of either C# or Java will help when we get to the coding exercises. I really enjoyed going back through some of my favorite math papers in preparation for this course. I hope that you will allow me to be your guide through the fascinating world of information security with cryptography principles for I T professionals and developers at Pluralsight.