Learning SSL/TLS

Learning SSL/TLS

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 2h 24m | 293 MB

Secure Sockets Layer (SSL) and the succeeding Transport Layer Security (TLS) provide the backbone of securing intranet and internet network communications through encryption and authentication. SSL and TLS standards are widely used to secure network communications for services such as websites, VoIP, VPNs, and email messages. In this course, learn the skills you need to plan, implement, and maintain a public key infrastructure (PKI) ecosystem that supports SSL/TLS security certificates. Instructor Daniel Lachance dives into how to install and configure PKI solutions in both Windows and Linux. Learn about how certificates are issued and managed throughout their lifetime; how hashing provides integrity and digital signatures provide authentication; and more.

Topics include:

  • Symmetric and asymmetric encrypting
  • How certificates are issued and managed
  • Configuring a Linux OpenSSL PKI environment
  • How TLS supersedes SSL and is considered more secure
  • Acquiring a web server certificate
  • Acquiring a code-signing certificate
  • Configuring a website with a certificate
  • Securing files and folders with EFS
  • Configuring a TLS VPN
Table of Contents

1 Mitigate security holes in your network
2 What you should know
3 Cryptography overview
4 Symmetric and asymmetric encrypting
5 PKI hierarchy
6 Certificate authorities
7 Certificates
8 Certificate lifecycle management
9 Install a Microsoft AD CS certificate authority
10 Configure Microsoft AD CS certificate templates
11 Configure a Linux OpenSSL PKI environment
12 Configure an AWS Certificate Manager subordinate CA
13 SSL vs. TLS
14 Acquire a web server certificate using Microsoft AD CS
15 Acquire a client certificate using Microsoft AD CS
16 Acquire a web server certificate using OpenSSL
17 Acquire a web server certificate using AWS Certificate Manager
18 Acquire a code-signing certificate
19 Hashing and digital signatures
20 Configure a website with a certificate
21 Configure a web browser with a certificate
22 Configure a code-signing certificate with Microsoft PowerShell
23 Encrypting file system and certificates
24 Configure a TLS VPN
25 Next steps