Lynda - Understanding Secure Sockets Layer - 2014seeders: 54
leechers: 31
Lynda - Understanding Secure Sockets Layer - 2014 (Size: 337.71 MB)
DescriptionYear of Manufacture : 2014 Manufacturer : lynda.com Author : Sean Colins Duration : 1h 51m Language : English Format : MP4 Video : AVC, 1280x720, 30 fps, 693 Kbps Audio : AAC, 128 Kbps, 2 channels, 48 KHz Secure Sockets Layer (SSL) is a cryptography protocol to protect web communication. Understanding Secure Sockets Layer takes the complicated subject of using TLS / SSL with public key infrastructure (PKI) for trusted encryption and identity verification, and breaks it down into easy-to-understand components that entry-level IT technicians, consultants, and support staff need to know-regardless of the types of computers, users, or networks supported. Join Author Sean Colins for A Focused and approachable course That will Extend your Knowledge of common SSL concepts and practices, Including: Communications SSL Certificate Authorities Public Key Infrastructures Symmetric and asymmetric pairs Key Cryptographic hash functions Encryption Algorithms ConTenT: 0. Introduction Welcome1. What Is SSL and Where Is SSL Used? Why SSL? Trust and encryption on a network Understanding key pair encryption Trusted SSL vs. self-signed SSL SSL, TLS, and OpenSSL Who uses SSL? Understanding SSL transactions 2. How Do SSL Certificates Work? How do self-signed certificates work? How do public trusted certificates work? Reviewing provided certificates How a signature identifies you 3. How Do Signatures Work? Understanding hashing Using a hash function to create a digest using OpenSSL 4. Common Types of SSL Certificates Root certificate authorities Certificates that chain to the root Code-signing certificates 5. Using Certificates Creating a demo certificate authority Generating a server certificate Installing your certificate on a client system Setting up a secure website Testing your secure website 6. Check Your Expiration Dates Understanding certificate expiration Revoking a certificate Setting up a certificate-revocation list Renewing a certificate 7. Protecting Your Security Investment The importance of backups Archiving in a secure and recoverable way 8. Conclusion Next steps ScreenS: Related Torrents
Sharing Widget |