Java Cryptography Architecture: Hashing and Secure Password
4.1 (25 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
727 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Java Cryptography Architecture: Hashing and Secure Password to your Wishlist.

Add to Wishlist

Java Cryptography Architecture: Hashing and Secure Password

Learn how to implement secure hashing for Java Web, Backend and Desktop Applications as well as Android Apps
4.1 (25 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
727 students enrolled
Last updated 2/2016
English
Current price: $10 Original price: $175 Discount: 94% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 41 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Integrate file hashing into Java applications and Android apps
  • Integrate secure password hashing into Java applications and Android apps
View Curriculum
Requirements
  • You should be a Java developer and have an IDE ready, preferably – but not necessarily – Eclipse.
Description

In this course, you will learn how to implement document hashing and secure password hashing into Java applications using the Java Cryptography Architecture. This applies to Web applications and Java-based Desktop applications (e.g., Swing, AWT, SWT/RCP, JavaFX), but also database and backend applications as well as Android apps.

Get practical security background information from an IT security expert. Learn how to encode hashes in-memory and stream-based. Learn how to use salt and iteration count for secure password hashing following PBKDF2 from the security standard PKCS#5.

You should be an experienced Java developer to take this course. We will do hands-on coding examples that can be directly used within your enterprise applications.

Who is the target audience?
  • You should be an experienced Java developer before taking this course. For hashing, you only need a basic understanding. Details of secure hashing, practical background information and hands-on tips will be provided in the course.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 9 Lectures Collapse All 9 Lectures 40:35
+
Basic Introduction
2 Lectures 05:19

In this lecture, we prepare the environment for our coding exercises and get a basic understanding for the right Java version regarding crypto algorithms.

Setup
03:02
+
Java Cryptography Architecture: MessageDigest, MAC and PBKDF2
5 Lectures 29:41

Get to know the Java Cryptography Architecture and the basic hashing class.

Simple Hashing Example
04:44

Implement a real world in-memory file hashing example.

Real-world Hashing Example
07:24

Learn how to efficiently hash stream-based.

Preview 02:25

Learn how to use a MAC, e.g. HMAC, with Java. This is also the basis for secure password hashing.

Message Authentication Code (MAC)
05:25

Learn how to implement and integrate a secure password hashing scheme into your application. Get practical advice how to use these algorithms securely.

Secure Password Hashing with PBKDF2/PKCS#5
09:43

Strong Hashing Algorithms
1 question
+
Outro
2 Lectures 05:35

In this lecture, you see what wrapper libraries do and offer, in case you do not want to deal with the Java Cryptography Architecture and crypto parameters directly.

Preview 03:03

This is an installation tutorial how to install the “Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files” without downloading. If you run into trouble regarding the usage of the JCA in conjunction with strong crypto algorithms, you have to configure your JRE installation accordingly.

Preview 02:32
About the Instructor
Dipl.-Inform. Frank Hissen
4.2 Average rating
340 Reviews
6,738 Students
4 Courses
Computer Scientist / IT security expert

Frank Hissen successfully studied Computer Science at Darmstadt University of Technology (Germany) focusing on IT security. For over 15 years, he works as IT consultant and software engineer; for over 10 years, he also works in various positions as security expert in IT development and consulting projects. He mainly worked for large businesses but also medium-sized companies.

He develops software and system architectures for complex systems and implements them or supervises the implementation. Moreover, he creates studies and function specifications.

In the area of IT security, Mr. Hissen is specialized in applied and technical IT security. For major as well as smaller companies, he equally developed and implemented security solutions and accompanied processes for secure product and software development.

In the area of cryptography and encryption, Mr. Hissen developed security solutions as Senior Solution Engineer at SECUDE before he became self-employed in 2009. Since then he works as freelancing expert in the area of web and cloud application security. He creates secure conceptual designs of system architectures but also takes care of their secure implementation and corresponding security requirements. One other focus is the technical examination and validation of the actual implementation.

Until now, Mr. Hissen worked in various projects amongst others for Deutsche Telekom AG, SECUDE, Allianz AG, ITO Darmstadt UT and SAP Research.