Defensive Programmer: Cryptography

placeholder

This 8-video course helps learners explore the basics of programming cryptography cryptography types and applications and also examines encryption implementation code examples. In the first of two tutorials on encryption concepts you will explore the critical concepts of symmetric versus asymmetric cryptography and when to use one as opposed to another by learning the benefits of one over the other. In the second tutorial learners will continue by examining specific algorithms such as AES DES RSA Diffie-Hellman and Elliptic Curve and by looking into the strengths and weaknesses of these particular algorithms. Next you will take a careful look at the important concepts of confidentiality and integrity the use of hash codes message authentication codes and HMACs (hash message authentication codes). In the final four tutorials in this course learners will explore specific code samples where one can see Java cryptography Python cryptography C# cryptography and Javascript cryptography being implemented.