Securing Data with Asymmetric Cryptography
Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.
What you'll learn
Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.
Table of contents
- Overview 1m
- Fight 657 1m
- The Trust Us Certificate Authority 2m
- The Project 2m
- Data Transfer Objects 3m
- The Data 1m
- Initializing the CA 2m
- Creating a Cryptlib Key Pair 6m
- Creating Certfificates 3m
- Creating the Root CA Certificate 3m
- The Policy and Intermediate CAs 4m
- The CA Database 2m
- Submit a Certificate Signing Request to the CA 1m
- Issuing a Certificate 3m
- The Duck Airlines Project 2m
- Creating a Bouncy Castle Key Pair 3m
- Encryption 3m
- Decryption 2m
- Signing Data 2m
- Validating Signatures 1m
- Running the PKI Project 5m
- Summary 1m