From the course: Complete Guide to Application Security
Unlock this course with a free trial
Join today to access over 24,900 courses taught by industry experts.
Cryptography fundamentals
From the course: Complete Guide to Application Security
Cryptography fundamentals
- [Instructor] Application developers use cryptography to ensure that our secrets remain secret. They use it to protect data at rest, data in transit, and even data in use, which means in memory, but there are nuances to cryptography that every application security professionals should strive to understand. At its core, cryptography is all about protecting data, whether it's sitting on a hard drive, zooming across the internet, or even hanging out in your computer's memory. Essentially, we're talking about transforming readable information, what we call plain text, into something completely unusable by anyone who should not have access to that data. Think of it like scrambling a secret message so only the person with the decoder ring can read it. There are a few different ways to use cryptography, and I want to cover a few that you'll definitely bump into in your day-to-day work. First, let's talk about asymmetric or public key cryptography. Imagine you have two keys, a public key…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Security in the software development lifecycle (SDLC)4m 56s
-
(Locked)
Secure coding principles5m 8s
-
(Locked)
Input validation and sanitization7m 25s
-
Demo: Input validation and sanitization techniques5m 53s
-
(Locked)
Error handling and logging4m 34s
-
(Locked)
Demo: Secure error handling and logging5m 30s
-
(Locked)
Cryptography fundamentals5m 5s
-
(Locked)
Demo: Encryption and hashing in practice6m 53s
-
-
-
-
-
-
-
-