Building Secure Applications with Cryptography in .NET

In this course, you will learn how to use the .NET Framework to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication.
Course info
Rating
(40)
Level
Intermediate
Updated
Oct 16, 2020
Duration
3h 10m
Table of contents
Course Overview
Introduction
Cryptographic Random Numbers
Hashing Algorithms
Secure Password Storage
Symmetric Encryption
Asymmetric Encryption
Digital Signatures
Hybrid Encryption
Course Summary
Description
Course info
Rating
(40)
Level
Intermediate
Updated
Oct 16, 2020
Duration
3h 10m
Description

As a software developer you have a duty to your employer to secure and protect their data. In this course, Building Secure Applications with Cryptography in .NET, you will learn how to use the .NET Base Class Libraries (.NET Framework, .NET Core, .NET 5) to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication. First, you will explore random number generation and hashing. Then, you will discover authenticated hashing and password based key derivation functions. Finally, you will see both symmetric and asymmetric encryption using AES and RSA. By the end of this course, you will know how to combine these all together to produce a hybrid encryption scheme which includes AES, RSA, HMACS, and Digital Signatures.

Course FAQ
Course FAQ
What is cryptography?

Cryptography is the method of protecting information and communications through the use of codes, so only those who are intended to read and process can do so.

What is C#?

C# is a general purpose and object-oriented programming language.

What is C# used for?

C# is commonly used for backend services, windows applications, website development, and game development.

What will I learn in this app security course?

In this course, you will learn how to secure random number generation, key derivation functions, create symmetric encryption with AES, create asymmetric encryption with RSA, and create digital signatures of data. By the end of this course you will know the theory and practice of encrypting sensitive data.

What are some of the benefits of the dot net framework?

Some benefits of the dot net frake work are: the framework is an object-oriented programming language, offers visual studio, has a great caching system, cross platform development, and the framework is easy to deploy and maintain.

About the author
About the author

Stephen Haunts is an experienced Software Developer and Leader who has worked across multiple business domains including Computer Games, Finance, and Healthcare Retail and Distribution. Stephen has worked in languages ranging from Assembler, various forms of BASIC, to C and C++, and then finding his love of C# and .NET.

More from the author
Lean Software Development Fundamentals
Intermediate
2h 35m
Jul 19, 2021
More courses by Stephen Haunts
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, everyone. My name is Stephen Haunts, and welcome to my course, Building Secure Applications with Cryptography in .NET. I am a freelance software developer, trainer, and writer, and one of my specialisms is enterprise software security. As a software developer working in an organization, you have a big responsibility to your employers and their customers to protect their data to make it safer against data breaches. Cryptography has a reputation as being very complicated, but in practice it's not that hard to implement with some guidance. In this course, I'm going to take you through all of the main cryptographic primitives available in the .NET Framework, .NET Core, .NET 5, and beyond. We're going to cover some of the following topics: secure random number generation, hashing and password‑based key derivation functions, symmetric encryption with AES, including the recently added GCM mode, asymmetric encryption with RSA, and creating digital signatures of your data. Towards the end of this course, I'm going to show you how to combine lots of these different primitives together to perform what is called hybrid encryption, where you can take advantage of all the best features of each tool. By the end of this course, you'll have a firm grasp with the theory and practice when it comes to encrypting sensitive data in your enterprise systems. Cryptography doesn't have to feel complicated or scary. I hope that I can demystify this subject with of lots of demos and included code samples and give you all the tools you need to become an expert in no time. Before beginning this course, you should be reasonably familiar with C# and your IDE of choice from Visual Studio for Windows or Mac, Visual Studio Code, or JetBrains Rider. The majority of what I teach in this course is completely cross‑platform between Windows, macOS, and Linux, apart from a few small sections, which I'll call out during this course. I hope you'll join me in this journey to learn about cryptography in the .NET platform with this course. Building Secure Applications with Cryptography in .NET, here at Pluralsight.