YoVDO

Exploiting PKI for Fun and Profit - The Next Yellow Padlock Icon?

Offered By: YouTube

Tags

Public Key Infrastructure Courses Cryptography Courses Network Security Courses Social Engineering Courses Digital Certificates Courses Footprinting Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Public Key Infrastructure (PKI) exploitation and its implications in this 45-minute conference talk. Delve into a comprehensive overview of public key cryptography, examine the EFF SSL Observatory, and understand the concept of ECA certificates. Learn about potential social engineering opportunities, including a case study at ORC. Investigate footprinting techniques for ORC networks and analyze ECA network security measures. Discover the requirements for Verisign ECA certificates and notary processes. Gain insights into DoD military leadership implications and explore additions to existing tools in the realm of PKI security.

Syllabus

Intro
Public Key Crypto Refresher
EFF SSL Observatory
Back to the PKI training....
What's an ECA certificate?
Social Engineering Opportunity?
Social Engineering at ORC
Footprinting the ORC Network
ECA Network Security
Verisign ECA certificate
Notary Requirements
DoD Military Leadership
Additions to existing tools...


Related Courses

Asymmetric Cryptography and Key Management
University of Colorado System via Coursera
Information Security - Authentication and Access Control
New York University (NYU) via edX
Ethical Hacking: Cryptography
LinkedIn Learning
Protecting Social Security Numbers
LinkedIn Learning
SSCP Cert Prep: 5 Cryptography
LinkedIn Learning