Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.
Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.
Course Overview [Autogenerated] Hi, everyone. My name is Ed Curren and welcome to my course, Securing data with asymmetric cryptography. Asymmetric cryptography is used in everything from S S, L and T let certificates to credit card trips to digital documents. Signatures. Security is more critical than ever and is one of the most important skills to have in the industry today. In this course, we're going to explore most aspects of public private key pairs and the public key infrastructure framework will also write a certificate authority and use key pairs for encryption and digital signatures. Some of the major topics include generating and storing public private key pairs except 509 certificates, the public key infrastructure and how to implement all of this in code. By the end of this course, you'll be able to implement cryptographic security in your own projects. I hope you'll join me on this journey to learn asymmetric cryptography with the securing data with asymmetric cryptography course at plural site