We may earn an affiliate commission when you visit our partners.
Course image
Justin Boyer
Data is the lifeblood of your business. Protect it. In this course, Practical Cryptography in Node.js, you will gain the ability to protect user data within Node.js applications using the tools Node.js provides. First, you will learn how to protect passwords. Next, you will discover how to protect data at rest and in transit. Finally, you will explore how to beef up your authentication by adding two-factor authentication to a Node application. When you are finished with this course, you will have the skills and knowledge of cryptography needed to protect data in Node.js applications.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers industry-standard tools for cryptography in Node.js
Develops core skills in Node.js cryptography, including password protection, data protection at rest and in transit, and two-factor authentication
Suitable for developers with prior Node.js knowledge seeking to enhance their cryptography skills
Taught by Justin Boyer, an experienced instructor in Node.js and cryptography
Self-paced and online format allows for flexibility in learning
Requires a working knowledge of Node.js and cryptography concepts

Save this course

Save Practical Cryptography in Node.js to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Practical Cryptography in Node.js. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Practical Cryptography in Node.js will develop knowledge and skills that may be useful to these careers:
Application Security Engineer
Application Security Engineers who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Data Scientist
Data Scientists who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Database Administrator
Database Administrators who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Web Developer
Web Developers who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
IT Auditor
IT Auditors who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Risk Analyst
Risk Analysts who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Cloud Engineer
Cloud Engineers who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Network Engineer
Network Engineers who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Security Analyst
Security Analysts who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Software Architect
Software Architects who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Security Consultant
Security Consultants who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Forensic Analyst
Forensic Analysts who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Cryptographer
Node.js is a JavaScript runtime environment used to build a variety of applications and services. Cryptographers who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Information Security Officer
Information Security Officers who utilize Node.js in their work may benefit from taking this course because the course provides a general overview of cryptography within Node.js, and discusses how to protect passwords, data at rest, data in transit, and methods for two-factor authentication.
Software Engineer
Software Engineers who utilize Node.js in their work may benefit from taking this course. Because Node.js is used so widely, a Software Engineer with knowledge of cryptography within Node.js may be at an advantage.

Reading list

We've selected 14 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Practical Cryptography in Node.js.
Provides a comprehensive overview of cryptographic engineering from a practical perspective, covering principles, techniques and applications. It's a valuable reference for designing, implementing and evaluating secure cryptographic systems. Also, it is used as a textbook at many universities.
Monumental reference work on cryptography, covering the field from the basics to the most advanced topics. It's a must-have for anyone who wants to understand the design and implementation of cryptographic algorithms.
Provides a comprehensive and up-to-date treatment of modern cryptography. It covers the theoretical foundations of cryptography, as well as the practical applications of cryptographic techniques. It's a valuable resource for anyone who wants to learn about the latest advances in cryptography.
Provides a thorough explanation of the SSL/TLS protocols, which are essential for securing network communications. It covers the protocol design, implementation and security analysis, making it a valuable resource for anyone who wants to understand how to protect data in transit.
Provides a comprehensive overview of information security. It covers the latest security technologies and trends. It's a valuable resource for anyone who wants to learn about the latest developments in information security.
Comprehensive textbook on cryptography and network security. It covers the fundamentals of cryptography, as well as the design and implementation of security protocols. It's a valuable resource for anyone who wants to learn about the principles and practices of cryptography.
Provides a concise and accessible introduction to modern cryptography. It covers the essential concepts and techniques of cryptography, making it a valuable resource for anyone who wants to learn about the basics of cryptography.
Provides a comprehensive overview of network security. It covers the principles of network security, as well as the latest security technologies and standards. It's a valuable resource for anyone who wants to learn about the latest trends in network security
Provides a comprehensive guide to web application security. It covers the latest web application hacking techniques and countermeasures. It's a valuable resource for anyone who wants to learn how to protect their web applications from attack.
Provides a comprehensive overview of computer security. It covers the latest security technologies and trends. It's a valuable resource for anyone who wants to learn about the latest developments in computer security.
Provides a practical guide to network security. It covers the latest hacking techniques and countermeasures. It's a valuable resource for anyone who wants to learn how to protect their networks from attack.
Provides a practical guide to using Python for hacking and penetration testing. It covers the latest Python hacking techniques and tools. It's a valuable resource for anyone who wants to learn how to use Python to attack and defend networks.
Provides a fascinating look at the human element of security. It covers the latest social engineering techniques and countermeasures. It's a valuable resource for anyone who wants to learn how to protect themselves from social engineering attacks.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser