Securing Data with Asymmetric Cryptography
Offered By: Pluralsight
Course Description
Overview
Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.
Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.
Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.
Syllabus
- Course Overview 1min
- Introducing the Public Key Infrastructure 16mins
- The Public Private Key Pair 14mins
- X.509 Certificates 14mins
- Writing the Code 52mins
- Summary 1min
Taught by
Edward Curren
Related Courses
Information Security - Authentication and Access ControlNew York University (NYU) via edX Cryptography from Scratch| Master Cryptography in Java
Udemy Ethical Hacking: Cryptography
LinkedIn Learning Windows Server Network Infrastructure
Microsoft via Microsoft Learn Windows 8: Networking and Security
LinkedIn Learning