From the course: Ethical Hacking: Cryptography
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Fundamentals of public key infrastructure (PKI)
From the course: Ethical Hacking: Cryptography
Fundamentals of public key infrastructure (PKI)
- [Instructor] With all the knowledge you've learned to this point, we can now focus on the use cases for implementing cryptographic solutions. We started with understanding encryption versus hashing and highlighting the common algorithms associated with those methods for protecting data. There are three states of data. One is data at rest, which you can think of is literally sleeping. Data at rest means it's written on some type of storage device or system, such as a disk or USB stick. The next state of data is in transit, which means it's moving across the network. We're going to look at some pretty cool end-to-end encryption solutions in this space. The last state is data in use, which means it's being actively consumed by systems or people. We'll concentrate on solving the problems of preventing the data from being read or tampered with, especially while being stored, or at rest, and emailed, or in transit. First, we must highlight that strong cryptography depends on some degree…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Fundamentals of public key infrastructure (PKI)6m 9s
-
(Locked)
Fundamentals of public key infrastructure (PKI), continued8m 19s
-
(Locked)
Implementations of public key infrastructure (PKI)7m 7s
-
(Locked)
The SSL and TSL handshake process5m 13s
-
(Locked)
Examine a x.509 digital certificate4m
-
(Locked)
-
-
-