Cryptocurrency & Blockchain
Star icon
Most Popular
Hands on Training icon
Hands On Training
Star icon
Hands on Training icon

Building Secure Applications with Cryptography in .NET

Course Cover
compare button icon
Course Report - Building Secure Applications with Cryptography in .NET

Course Report

Find detailed report of this course which helps you make an informed decision on its relevance to your learning needs. Find out the course's popularity among Careervira users and the job roles that would find the course relevant for their upskilling here. You can also find how this course compares against similar courses and much more in the course report.

Course Features

icon

Duration

3.17 hours

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Effort

3 hours per week

icon

Teaching Type

Self Paced

icon

Video Content

3.17 hours

Course Description

Your employer has a responsibility to you as a software developer to protect and secure their data. This course, Building Secure Applications With Cryptography in.NET teaches you how to use the.NET Base Class Libraries,.NET Core and.NET 5.5 to protect your data. It will satisfy confidentiality, integrity, authenticity, non-repudiation and authentication. You will first explore random number generation. Next, authenticated hashing will be explored and password-based key derivation functions will be revealed. Finally, you'll see both symmetrical and asymmetric encryption with AES and RSA. You will be able to combine them all to create a hybrid encryption scheme that includes AES, RSA and HMACS.

Course Overview

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Asymmetric Encryption

Cryptographic Random Numbers

Digital Signatures

Hashing Algorithms

Hybrid Encryption

Secure Password Storage

Symmetric Encryption

Course Instructors

Author Image

James D. Murray

Instructor

James D. Murray is an active information security professional and a deprecated software engineer. Mr. Murray started thinking about programming in 1978 when he wrote his first BASIC program on a Com...
Course Cover