Autoplay
Autocomplete
Previous Lesson
Complete and Continue
PKI Essentials-Understand the security of Digital Identities
Training Overview
Description of Training
Video Overview (2:59)
Introduction
1. Chapter Introduction (2:59)
2. Chocolate Cake Recipe - PKI Example 1 (3:20)
3. The digital treasure - PKI Example 2 (3:23)
4. Browser to Webserver- E2E Encryption (12:13)
5. PKI (5:11)
6. Encryption - What will we learn (1:55)
7. Encryption Levels (4:52)
8. Transport Encryption (4:35)
9. Symmetric Encryption (4:45)
10. Asymmetric Encryption (3:54)
11. Key exchange - Part 1 (8:47)
12. Key Exchange Algorithms - Part 2 (5:48)
13. Encryption Key Lengths (5:00)
14. Milestone Check -1
15. Encryption and PKI Tools Introduction (0:40)
16. TPM (3:53)
17. HSM (3:47)
18. KMS (3:36)
19. Secure Enclaves (3:31)
20. Obfuscation (2:41)
21. Steganography (3:04)
22. Tokenization (3:19)
23. Data Masking (3:20)
24. Data Masking Types (2:48)
25. Masking Techniques (2:54)
26. Hashing Introduction - What are Hash Functions (3:14)
27. Real word usage of Hash Functions (3:09)
28. Journey of Hashing Algorithm (3:35)
29. Strengths & Weaknesses of Hashing Algorithms (3:43)
30. Using Right Hashing Algorithms (3:05)
31. Hashing Vulnerabilities and Historical Exploits (2:29)
32. Salting (3:09)
33. Salting Under the hood (4:45)
34. Definition and basic concept & History of digital signatures (2:54)
35. The importance of digital signatures in modern communication (3:09)
36. The cryptographic principles behind digital signatures (4:20)
37. The process of creating and verifying a digital signature (3:51)
38. How digital signatures ensure the integrity and non-repudiation of data (4:02)
39. Common algorithms used for digital signatures, (4:28)
40. Digital signature standards (3:23)
41. Advanced cryptographic concepts related to digital signatures (4:37)
42. Key stretching (2:15)
43. Contributors in the field of Key stretching (2:21)
44. Blockchain - Introduction (3:33)
45. Blockchain as a decentralized digital ledger (2:21)
46. Adoption of block chain (3:49)
47. The Dawn of Internet Security and the Rise of Digital Certificates (4:51)
48. A brief history of cryptographic methods (4:03)
49. The introduction of SSL by Netscape (3:58)
50. How SSL became the standard for securing internet communications (4:08)
51. Why SSL evolved into TLS (2:30)
52. Poodle Attack (4:26)
53. Key improvements and differences between SSL and TLS protocols (3:50)
54. Versions of TLS and their Enhancements (5:11)
55. Certificate Authorities and their history (4:23)
56. Understanding Types of CAs - Public vs. Private (3:16)
57. Hierarchical Trust Model - Example (5:25)
58. Hierarchical Trust Model - Overview and Best Practices (5:07)
59. What is a Root CA (6:03)
60. The Need for Intermediate Certificate Authorities (6:18)
61. What are CRL-s (2:34)
62. The Need for OCSP-s (2:54)
63. How does the browser identify the OCSP Server (3:59)
64. What are Self Signed Certificates (2:49)
65. What are Third party Certificates (3:32)
66. What is a CSR What are its Key Components (5:11)
67. Wild Card Certificates (3:11)
68. Buying a domain - Lab (3:04)
69. Building a Linux VM (2:24)
70. Mapping A record in DNS (1:49)
71. Configuring the webserver with Lets Encrypt certificate (5:28)
72. Verifying the Lets Encrypt Certificate chain of Trust (4:02)
73. Cert bot Supporting and helpful commands (4:23)
74. Step by Step - Verifying SELF SIGNED KEYS with OPENSSL (12:28)
Audio Version of Training
Audio Download
60. The Need for Intermediate Certificate Authorities
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock