Securing Data with Asymmetric Cryptography
Course info



Course info



Description
Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.
Section Introduction Transcripts
Course Overview
Hi everyone, my name is Ed Curren, and welcome to my course Securing Data with Asymmetric Cryptography. Asymmetric cryptography is used in everything from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today. In this course, we're going to explore most aspects of public private key pairs and the public key infrastructure framework. We'll also write a certificate authority and use key pairs for encryption and digital signatures. Some of the major topics include generating and storing public private key pairs, X.509 certificates, the public key infrastructure, and how to implement all of this in code. By the end of this course, you'll be able to implement cryptographic security in your own projects. I hope you'll join me on this journey to learn asymmetric cryptography with the Securing Data with Asymmetric Cryptography course at Pluralsight.