Companies Home Search Profile

Securing Data with Asymmetric Cryptography

Focused View

Edward Curren

1:40:01

12 View
  • 01 - Course Overview.mp4
    01:08
  • 02 - The Public Key Infrastructure.mp4
    00:45
  • 03 - PKI Trust and Responsibilities.mp4
    02:49
  • 04 - Certificate Authorities Overview.mp4
    00:52
  • 05 - The Root CA.mp4
    02:58
  • 06 - The Intermediate CA.mp4
    02:25
  • 07 - The Policy CA.mp4
    02:30
  • 08 - Using Public and Private Keys.mp4
    01:47
  • 09 - Getting a Certificate Signed by a CA.mp4
    01:06
  • 10 - Revoking a Certificate.mp4
    01:42
  • 11 - Overview.mp4
    00:27
  • 12 - The Key Pair.mp4
    04:30
  • 13 - The Math of Key Pairs.mp4
    06:45
  • 14 - Storing Keys.mp4
    02:06
  • 15 - Summary.mp4
    00:22
  • 16 - Overview.mp4
    00:52
  • 17 - Certificate Types.mp4
    01:39
  • 18 - The Certificate Structure.mp4
    03:10
  • 19 - The Certificate Signature Request Structure.mp4
    01:24
  • 20 - The Certificate Revocation List Structure.mp4
    01:28
  • 21 - Certificate Chains.mp4
    01:28
  • 22 - Certificate Identities.mp4
    02:16
  • 23 - Certificate Extensions.mp4
    02:14
  • 24 - Overview.mp4
    00:36
  • 25 - Fight 657.mp4
    00:42
  • 26 - The Policy and Intermediate CAs.mp4
    03:36
  • 27 - The CA Database.mp4
    02:24
  • 28 - Submit a Certificate Signing Request to the CA.mp4
    01:12
  • 29 - Issuing a Certificate.mp4
    02:56
  • 30 - The Duck Airlines Project.mp4
    02:01
  • 31 - Creating a Bouncy Castle Key Pair.mp4
    03:23
  • 32 - Encryption.mp4
    03:07
  • 33 - Decryption.mp4
    01:50
  • 34 - Signing Data.mp4
    01:56
  • 35 - Validating Signatures.mp4
    00:59
  • 36 - The Trust Us Certificate Authority.mp4
    01:35
  • 37 - Running the PKI Project.mp4
    05:06
  • 38 - Summary.mp4
    00:30
  • 39 - The Project.mp4
    02:00
  • 40 - Data Transfer Objects.mp4
    02:53
  • 41 - The Data.mp4
    01:20
  • 42 - Initializing the CA.mp4
    02:12
  • 43 - Creating a Cryptlib Key Pair.mp4
    06:26
  • 44 - Creating Certfificates.mp4
    02:32
  • 45 - Creating the Root CA Certificate.mp4
    02:39
  • 46 - Summary.mp4
    01:23
  • Description


    Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.

    What You'll Learn?


      Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Edward Curren
    Edward Curren
    Instructor's Courses
    Ed graduated from the University of Dayton in 1995 with a BS in Computer Science and often wishes he could break the secrets of quantum physics to return to that time. Later Ed contracted with the Department of Homeland Security to be part of a team which built a counter-terrorism system before moving on to the FBI’s counter-intelligence division where he worked with the Advanced Concepts Unit building software solutions to address difficulties that the bureau faced. He decided to move back to the Cleveland area to be near family as his daughter turned 3 years old and took a position with One Call Now as the Director of Software Development. When One Call Now was bought out, he joined the architecture team at National Interstate Insurance as the enterprise architect. Mr. Curren hold 3 patents for software innovations, is an occasional guest lecturer at the University of Akron and loves to marry his passion for technology with his passion for flying.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 46
    • duration 1:40:01
    • level preliminary
    • Release Date 2023/12/08