YoVDO

Passkeys: What They Are, Why We Want Them, and How to Use Them

Offered By: John Savill's Technical Training via YouTube

Tags

Social Engineering Courses Passwordless Authentication Courses Public Key Infrastructure Courses WebAuthN Courses FIDO2 Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of passkeys in this comprehensive video tutorial. Delve into the history of authentication, understand why traditional methods like Authenticator weren't phishing-resistant, and discover the need for protection against social engineering. Learn about passkeys built on PKI and passwordless FIDO2 technology. Understand the authentication flow, including relying parties, clients, and authenticators. Examine the use of public and private keys, user gestures, and the concepts of presence and proximity. Dive into WebAuthn implementation, API calls, and key benefits for protection. Explore cross-device authentication, various authenticator options, and types of passkeys. Discover where passkeys can be used and how they differ from previous methods. Learn about implementing passkeys with Microsoft Entra, including enabling, adding, and using passkeys. Witness demonstrations of same-device and cross-device authentication, and understand how passkeys work with Microsoft accounts. Gain valuable insights into this cutting-edge authentication technology to enhance security in your organization.

Syllabus

- Introduction
- Authentication history
- Why Authenticator wasn't phishing resistant
- Need protection from social engineering
- Passkeys
- Built on PKI
- Passwordless FIDO2
- How this works
- Relying Party
- Client
- Authenticator
- Public and private keys
- Authentication flow
- Need for a user gesture and intent
- Presence and proximity
- The promise of the protocol
- Additional detail
- WebAuthn use
- Relying Party ID
- WebAuthn client checks
- Javascript and API calls
- Key benefits for protection
- Presence and CTAP
- Bluetooth use
- Cross-device authentication
- How many passkeys
- Authenticator options
- Types of passkey
- Authenticator can roam
- Where can passkeys be used
- What is different from before
- Using with Entra
- Enabling passkeys in Entra
- User passkey addition
- Using a passkey
- Using passkey on same device
- Cross-device authentication
- Microsoft accounts
- Always synced
- MSA passkey CDA demo
- Summary
- Close


Taught by

John Savill's Technical Training

Related Courses

AWS Security – Encryption Fundamentals
Amazon Web Services via AWS Skill Builder
Cryptography
(ISC)² via Coursera
Cryptography: Learn Public Key Infrastructure from Scratch
Packt via Coursera
CISO Security Controls: Network Controls
Cybrary
Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX