Building Secure Applications with Cryptography in .NET

by Stephen Haunts

In this course, you will learn how to use the .NET Framework to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication.

What you'll learn

As a software developer you have a duty to your employer to secure and protect their data. In this course, Building Secure Applications with Cryptography in .NET, you will learn how to use the .NET Base Class Libraries (.NET Framework, .NET Core, .NET 5) to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication. First, you will explore random number generation and hashing. Then, you will discover authenticated hashing and password based key derivation functions. Finally, you will see both symmetric and asymmetric encryption using AES and RSA. By the end of this course, you will know how to combine these all together to produce a hybrid encryption scheme which includes AES, RSA, HMACS, and Digital Signatures.

Table of contents

Course Overview
2mins

Course FAQ

What is cryptography?

Cryptography is the method of protecting information and communications through the use of codes, so only those who are intended to read and process can do so.

What is C#?

C# is a general purpose and object-oriented programming language.

What is C# used for?

C# is commonly used for backend services, windows applications, website development, and game development.

What will I learn in this app security course?

In this course, you will learn how to secure random number generation, key derivation functions, create symmetric encryption with AES, create asymmetric encryption with RSA, and create digital signatures of data. By the end of this course you will know the theory and practice of encrypting sensitive data.

What are some of the benefits of the dot net framework?

Some benefits of the dot net frake work are: the framework is an object-oriented programming language, offers visual studio, has a great caching system, cross platform development, and the framework is easy to deploy and maintain.

About the author

Stephen Haunts is an experienced Software Developer and Leader who has worked across multiple business domains including Computer Games, Finance, and Healthcare Retail and Distribution. Stephen has worked in languages ranging from Assembler, various forms of BASIC, to C and C++, and then finding his love of C# and .NET. Stephen also runs a Software Development and Leadership blog called {Coding in the Trenches} which can be read at http://www.stephenhaunts.com . Stephen also runs a small music ... more

Ready to upskill? Get started