Researchers have presented estimations that up to 90% of all applications have at least one vulnerability. While research about mobile applications in particular is scarce, high-profile data thefts like the Snapchat user database indicate serious security concerns even for apps that are used by millions.
This advanced hands-on course picks where “Top 10 Web Threats” left off – namely to deepen the understanding of the top vulnerabilities and to broaden the scope of vulnerabilities that are discussed.
Various sources identify that between 20% and 60% of websites have each at least one serious vulnerability. A serious issue is the diversity of threats on Web platforms – different types of attacks can shut down entire services, steal valuable data, impersonate legitimate sites, intercept data on-the-fly, forge user actions, etc.
The “Introduction to practical cryptography for software specialists” course will provide you with the necessary, but quite commonly overlooked foundations, of information security, and in particular, cryptography. Together, we will examine different cryptographic primitives along with strategies on where and how to apply them. Moreover, this course will provide you with a strong foundation on symmetric and asymmetric cryptography, cryptographic hashes and establish the baseline on their proper application and combination.