-
Course
- Security
Securing Data with Asymmetric Cryptography
Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.
What you'll learn
Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.
Table of contents
- The Public Key Infrastructure | 45s
- PKI Trust and Responsibilities | 2m 49s
- Certificate Authorities Overview | 52s
- The Root CA | 2m 58s
- The Intermediate CA | 2m 25s
- The Policy CA | 2m 30s
- Using Public and Private Keys | 1m 47s
- Getting a Certificate Signed by a CA | 1m 6s
- Revoking a Certificate | 1m 42s
About the author
With over 20 years of experience in the software world, Ed is currently an enterprise architect but always a mentor and innovator.
More Courses by Edward