We may earn an affiliate commission when you visit our partners.
Course image
Stephen Haunts
As a software developer you have a duty to your employer to secure and protect their data. In this course, you will learn how to use the .NET Framework to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication. This...
Read more
As a software developer you have a duty to your employer to secure and protect their data. In this course, you will learn how to use the .NET Framework to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication. This course covers random number generation, hashing, authenticated hashing, and password based key derivation functions. The course also covers both symmetric and asymmetric encryption using DES, Triple DES, AES, and RSA. You then learn how to combine these all together to product a hybrid encryption scheme which includes AES, RSA, HMACS, and Digital Signatures.
Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches skills that help learners improve their job security
Covers essential security concepts: confidentiality, integrity, non-repudiation, and authentication
Develops skills across a wide spectrum of cryptography techniques
Builds a strong foundation in cryptography, providing a comprehensive study of its various aspects

Save this course

Save Practical Cryptography in .NET to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Practical Cryptography in .NET. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Practical Cryptography in .NET will develop knowledge and skills that may be useful to these careers:
Cryptography Engineer
Cryptography Engineers specialize in protecting data using encryption and other techniques. They must understand the principles of cryptography and be able to apply them to real-world problems. This course provides a foundation in the principles of cryptography and will help you develop the skills needed to be a successful Cryptography Engineer.
Security Consultant
Security Consultants help organizations to protect their computer systems and networks from unauthorized access and cyberattacks. They need to understand the principles of cryptography and be able to apply them to secure systems. This course will help you develop the knowledge and skills needed to be a successful Security Consultant.
Security Researcher
Security Researchers develop new techniques to protect computer systems and networks from unauthorized access and cyberattacks. They need to understand the principles of cryptography and be able to apply them to secure systems. This course will help you develop the knowledge and skills needed to be a successful Security Researcher.
Information Security Analyst
Information Security Analysts design and implement security measures to protect computer systems and networks from unauthorized access and cyberattacks. They need to understand the principles of cryptography and be able to apply them to secure systems. This course will help you develop the knowledge and skills needed to be a successful Information Security Analyst.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer systems and networks from unauthorized access and cyberattacks. They need to understand the principles of cryptography and be able to apply them to secure systems. This course will help you develop the knowledge and skills needed to be a successful Cybersecurity Analyst.
IT Security Analyst
IT Security Analysts protect computer systems and networks from unauthorized access and cyberattacks. They need to understand the principles of cryptography and be able to apply them to secure systems. This course will help you develop the knowledge and skills needed to be a successful IT Security Analyst.
Security Engineer
Security Engineers design and implement security measures to protect computer systems and networks from unauthorized access and cyberattacks. They need to understand the principles of cryptography and be able to apply them to secure systems. This course will help you develop the knowledge and skills needed to be a successful Security Engineer.
Security Architect
Security Architects design and implement security measures to protect computer systems and networks from unauthorized access and cyberattacks. They need to understand the principles of cryptography and be able to apply them to secure systems. This course will help you develop the knowledge and skills needed to be a successful Security Architect.
Network Engineer
Network Engineers design and implement computer networks. They need to understand the principles of cryptography and be able to apply them to secure networks. This course will help you develop the knowledge and skills needed to be a successful Network Engineer.
Software Engineer
Software Engineers develop and maintain software applications. They need to understand the principles of cryptography and be able to apply them to secure applications. This course will help you develop the knowledge and skills needed to be a successful Software Engineer.
Systems Engineer
Systems Engineers design and implement computer systems and networks. They need to understand the principles of cryptography and be able to apply them to secure systems. This course will help you develop the knowledge and skills needed to be a successful Systems Engineer.
Cloud Engineer
Cloud Engineers design and implement cloud computing solutions. They need to understand the principles of cryptography and be able to apply them to secure cloud applications. This course will help you develop the knowledge and skills needed to be a successful Cloud Engineer.
DevOps Engineer
DevOps Engineers work to bridge the gap between development and operations teams. They need to understand the principles of cryptography and be able to apply them to secure software applications. This course will help you develop the knowledge and skills needed to be a successful DevOps Engineer.
Data Scientist
Data Scientists use data to solve business problems. They need to understand the principles of cryptography and be able to apply them to secure data. This course will help you develop the knowledge and skills needed to be a successful Data Scientist.
Machine Learning Engineer
Machine Learning Engineers develop and implement machine learning models. They need to understand the principles of cryptography and be able to apply them to secure machine learning models. This course will help you develop the knowledge and skills needed to be a successful Machine Learning Engineer.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Practical Cryptography in .NET.
Comprehensive reference on cryptography. It covers a wide range of topics, including symmetric and asymmetric encryption, hashing, digital signatures, and cryptanalysis. It valuable resource for students and professionals who need to understand the principles and practices of cryptography.
Classic in the field of cryptography. It covers a wide range of topics, including symmetric and asymmetric encryption, hashing, and digital signatures. It valuable resource for software developers who need to understand and implement cryptographic algorithms.
Provides a comprehensive overview of cryptographic engineering principles and practices. It covers topics such as random number generation, hashing, encryption, and digital signatures. It valuable reference for software developers who need to understand and implement cryptographic algorithms.
Comprehensive textbook on cryptography with coding theory. It covers a wide range of topics, including symmetric and asymmetric encryption, hashing, digital signatures, and cryptanalysis. It valuable resource for students and professionals who need to understand the principles and practices of cryptography.
Provides a comprehensive overview of network security. It covers topics such as cryptography, network protocols, and security architectures. It valuable resource for software developers who need to understand the security implications of their applications.
Provides a comprehensive overview of cryptography. It covers a wide range of topics, including symmetric and asymmetric encryption, hashing, digital signatures, and cryptanalysis. It valuable resource for students and professionals who need to understand the principles and practices of cryptography.
Provides a fascinating and accessible overview of the history of cryptography. It covers topics such as the development of writing, the use of codes and ciphers, and the modern science of cryptography. It valuable resource for anyone who is interested in the history and development of cryptography.
Provides a concise and accessible overview of cryptography. It covers topics such as the history of cryptography, the different types of cryptographic algorithms, and the applications of cryptography. It valuable resource for anyone who wants to learn more about cryptography.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser