Advanced

Cryptography for Developers

Use libsodium and Web Crypto safely: keys, rotations, AEAD choices, and what to never implement yourself.

Cover art for Cryptography for Developers

Overview

Labs rotate through tokenization, envelope encryption, and KMS integration patterns common in Japanese SaaS stacks. You leave with annotated snippets rather than hand-rolled ciphers.

Duration: 5 weeks · 34 hours · Format: Cohort · Language: English · Certificate: Included

Price (informational): ¥112,000

What is included

  • Side-by-side comparisons of AES-GCM vs ChaCha20-Poly1305
  • Key rotation runbook with zero-downtime cutover
  • Homework on misuse of JWTs without moralizing
  • Office hour walkthrough of HSM-backed flows
  • Checklist for logging around crypto failures
  • Reading list on post-quantum readiness without hype

Outcomes

  • Select correct primitives for three product scenarios
  • Draft a rotation plan engineering and ops can execute
  • Identify two anti-patterns in your current codebase
Portrait for Noah Clarke

Lead mentor

Noah Clarke

Applied cryptographer supporting regulated workloads in APAC.

FAQ

Comfort with modular arithmetic helps but we stay implementation-first; proofs are optional readings.

Experience notes

The JWT misuse homework stung in the best way — we deleted two custom “encryption” helpers the same week.

Yui · Mobile engineer · 5/5

Rotation runbook is now attached to our on-call binder; still tweaking timelines but structure is solid.

Diego · Identity platform

Return to catalog Request information