As a software developer you have a duty to your employer to secure and protect their data. In this course, Building Secure Applications with Cryptography in .NET, you will learn how to use the .NET Base Class Libraries (.NET Framework, .NET Core, .NET 5) to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication. First, you will explore random number generation and hashing. Then, you will discover authenticated hashing and password based key derivation functions. Finally, you will see both symmetric and asymmetric encryption using AES and RSA. By the end of this course, you will know how to combine these all together to produce a hybrid encryption scheme which includes AES, RSA, HMACS, and Digital Signatures.
Stephen Haunts is an experienced Software Developer and Leader who has worked across multiple business domains including Computer Games, Finance, and Healthcare Retail and Distribution. Stephen has worked in languages ranging from Assembler, various forms of BASIC, to C and C++, and then finding his love of C# and .NET.
Course Overview [Autogenerated] Hi, everyone. My name is Steven Haunts. Welcome to my calls. Building secure applications with cryptography in dot Net. I am a freelance software developer, trainer and writer. One of my special ISMs is enterprise software Security. As a software developer working in an organization, you have a big responsibility to your employers and their customers to protect their data to make it safe against data breaches. Cryptography has a reputation as being very complicated, but in practice it's not that hard to implement with some guidance in this course against take you through all of the main cryptographic primitives available in the Dark Net framework dot net core dot net five and beyond. We're going to cover some of the following topics. Secure random number, generation hashing and password based key do of ocean functions. Symmetric encryption with S, including the recently added GCM mode, asymmetric encryption with RSA and creating digital signatures of your data. Towards the end of this course, I'm going to show you how to combine not to these different primitives together to perform what is called hybrid encryption we can take advantage of all the best features of each tool by the end of this course, you have a phone grass with theory and practice. When it comes to encrypt insensitive data in your enterprise systems, cryptography doesn't have to feel complicated or scary. I hope that I can demystified the subject of lots of demos and included code samples give you all the tools you need to become an expert in no time before beginning this course, you should be reasonably familiar with C Sharp on your idea of choice from visual studio for Windows or Mac Visual studio code or Jetbrains Rider. The majority of what error teaching this course is completely cross platform between Windows, Mac OS and Linux. Apart from a few small sections, which I'll call out during this course, I hope you'll join me in this journey to learn about cryptography in the dark net platform with this course building secure applications with cryptography and dot net here at Pluralsight