With the introduction of wide-ranging and impactful legislation and requirements for privacy and data security (like GDPR), a radical, yet powerful cryptography-based solution is gaining traction and relevance. The “Untrusted Server” model assumes the Web application backend will never have access to customers’ data in plaintext, thereby negating almost all impact of data breaches – as the server is unable decrypt users’ data, so is the attacker.
The “Introduction to practical cryptography for software specialists” course will provide you with the necessary, but quite commonly overlooked foundations, of information security, and in particular, cryptography. Together, we will examine different cryptographic primitives along with strategies on where and how to apply them. Moreover, this course will provide you with a strong foundation on symmetric and asymmetric cryptography, cryptographic hashes and establish the baseline on their proper application and combination.