We may earn an affiliate commission when you visit our partners.
CodeMash

CodeMash 2020 | Practical Cryptography for Developers | Anthony Eden

Read more

CodeMash 2020 | Practical Cryptography for Developers | Anthony Eden

Understanding the building blocks for cryptography is important for every software developer, especially as the quantity and value of data stored and sent over networks continues to grow. In this talk, Anthony Eden will introduce you to the fundamentals of cryptography, demonstrating concepts such as symmetric and asymmetric encryption, hashing functions, message authentication codes, and more, using code examples. By the end of this talk, you will have a basic understanding of the different components used to ensure primary functions of cryptography and a set of resources for further exploration into modern cryptography.

Enroll now

What's inside

Syllabus

Practical Cryptography for Developers

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Teaches different components used to ensure primary functions of cryptography
Provides examples and code to demonstrate concepts in cryptography
Suitable for software developers seeking foundational knowledge in cryptography
Taught by Anthony Eden, a recognized expert in cryptography
Covers symmetric and asymmetric encryption, hashing functions, and message authentication codes
Part of CodeMash 2020 conference, known for its focus on software development

Save this course

Save Practical Cryptography for Developers: CodeMash to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Practical Cryptography for Developers: CodeMash. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Practical Cryptography for Developers: CodeMash will develop knowledge and skills that may be useful to these careers:
Security Consultant
Security Consultants advise organizations on how to protect their information and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Security Consultants are responsible for identifying and assessing risks to information and systems, and for developing and implementing security measures to mitigate these risks.
Cryptographer
Cryptographers design and analyze algorithms and protocols that are used to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction.
Software Developer
Software Developers design, develop, and maintain software applications. Software Developers may specialize in a particular area of software development, such as web development, mobile development, or data science.
Security Analyst
Security Analysts monitor and analyze security systems and data to identify and respond to security threats and incidents.
Computer Scientist
Computer Scientists conduct research in the field of computer science, and develop new technologies and applications.
Ethical Hacker
Ethical Hackers use their skills to identify and exploit vulnerabilities in computer systems and networks, with the goal of helping organizations improve their security.
Data Scientist
Data Scientists use their skills in statistics, mathematics, and computer science to extract insights from data.
Privacy Analyst
Privacy Analysts develop and implement policies and procedures to protect the privacy of individuals' data.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures, and for managing the organization's information security program.
Risk Manager
Risk Managers identify, assess, and manage risks to an organization.
Business Analyst
Business Analysts analyze business needs and develop solutions to meet those needs.
Systems Engineer
Systems Engineers design, implement, and maintain computer systems.
IT Auditor
IT Auditors review and evaluate an organization's information technology systems and controls to ensure that they are secure and compliant with regulations.
Project Manager
Project Managers plan, execute, and control projects.
Network Engineer
Network Engineers design, implement, and maintain computer networks.

Reading list

We haven't picked any books for this reading list yet.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser