Security Journey Blog

Take DevSecOps Training to the Next Level with Applied Cryptography

Written by Security Journey/HackEDU Team | Jul 31, 2025 4:41:53 PM

Cryptography is the cornerstone of security. It guarantees that our data remains our data, but one mistake, one small crack, is all it takes for an attacker to breach your system. At Security Journey, our hands-on Cryptography course covers the foundations of cryptography, provides insight into its subtle but critical details, and shows how it enables us all to use the internet securely. 

Applied Cryptography for DevSecOps 

Modern developers are familiar with cryptographic basics, and protocols like HTTPS are becoming ubiquitous. Practices like hashing passwords are widely understood as not just a good idea but a vital step in security. But cryptographic security isn't an inevitability; it's an uphill battle that's just getting harder.  

That's why we're expanding our DevSecOps course with a new Applied Cryptography module for those focused on cryptography and its role in the DevSecOps field. These hands-on lessons build directly on our Cryptography course, combining that foundational knowledge with real-world experiences to ensure your systems are secure, your keys are protected, and your defenses hold firm, even against attacks from within.  

What’s Included in the Applied Cryptography Module 

In these lessons, we show how those cryptography concepts are implemented in the real world, and how they make it possible to securely send data across the web, guaranteeing confidentiality, integrity, and availability.  

Here's what's launching: 

  1. Public Key Infrastructure (PKI) Sniff packets between two services, and implement encryption to prevent similar attacks. 
  2. Certificate Storage Learn how to securely store certificates and how to handle a situation where they fall into the wrong hands. 
  3. JWT Expiration Validation Perform a JWT replay attack, and learn one way to prevent them with proper token expiration validation. 
  4. JWT Monitoring Learn how to monitor JWTs, set up anomaly detection, and handle suspicious token usage. 
  5. Mutual TLS (mTLS) To prevent replay attacks, replace a poorly designed JWT authentication mechanism with MTLS. 

Why This Matters 

Cryptography is a vital component of every secure system. These lessons give developers the opportunity to apply cryptographic principles in live environments, simulate realistic attack scenarios, and implement defenses that are directly relevant to those in DevSecOps roles or related fields. Ready to equip your developers with deeper cryptography skills?