Securing Data with Asymmetric Cryptography
Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.
Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.
Author Name: Edward Curren
Author Description:
Ed graduated from the University of Dayton in 1995 with a BS in Computer Science and often wishes he could break the secrets of quantum physics to return to that time. Later Ed contracted with the Department of Homeland Security to be part of a team which built a counter-terrorism system before moving on to the FBI’s counter-intelligence division where he worked with the Advanced Concepts Unit building software solutions to address difficulties that the bureau faced. He decided to move back … more
Table of Contents
- Course Overview
1min - Introducing the Public Key Infrastructure
16mins - The Public Private Key Pair
14mins - X.509 Certificates
14mins - Writing the Code
52mins - Summary
1min
There are no reviews yet.