In this course, you will learn how to use .NET 6 to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication.
As a software developer, you have a duty to your employer to secure and protect their data. In this course, Cryptography in .NET 6, you will learn how to use the .NET Class Libraries to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication in your applications. First, you will explore random numbers and understand why they are so important to cryptography. Next, you will look at symmetric and asymmetric encryption, and see how they can work together to overcome each of their downsides. Then, you will explore hashing and authenticated hashing and see how they help satisfy integrity and authentication requirements. Finally, you will learn about digital signatures and how they satisfy the non-repudiation requirements. When you are finished with this course, you will have the knowledge of building up a working sample application that simulates a 2-way chat system between recipients. You will incorporate all the building blocks covered in the course to create a hybrid encryption-based example that shows you how everything works together when building larger protocols.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.