Securing Data with Asymmetric Cryptography

Asymmetric cryptography is used in everything ranging from SSL and TLS certificates to credit card chips to digital document signatures. Security is more critical than ever and is one of the most important skills to have in the industry today.
Course info
Level
Beginner
Updated
Nov 13, 2019
Duration
1h 40m
Table of contents
Description
Course info
Level
Beginner
Updated
Nov 13, 2019
Duration
1h 40m
Description

Data and communication security are critical issues across all industries. In this course, Securing Data with Asymmetric Cryptography, you will learn foundational knowledge of public private key pair cryptography and gain the ability to practically employ it in your projects. First, you will learn what key pairs are, how to generate them and how to store them. Next, you will discover X.509 certificates in detail. Finally, you will explore how to implement a fully functional PKI including a certificate authority. When you’re finished with this course, you will have the skills and knowledge of asymmetric cryptography needed to employ security in your projects.

About the author
About the author

With over 20 years of experience in the software world, Ed is currently an enterprise architect but always a mentor and innovator.

More from the author
Getting Started with Apache Ignite
Beginner
3h 22m
Jan 2, 2019
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
[Autogenerated] Hi, everyone. My name is Ed Curren and welcome to my course, Securing data with asymmetric cryptography. Asymmetric cryptography is used in everything from S S, L and T let certificates to credit card trips to digital documents. Signatures. Security is more critical than ever and is one of the most important skills to have in the industry today. In this course, we're going to explore most aspects of public private key pairs and the public key infrastructure framework will also write a certificate authority and use key pairs for encryption and digital signatures. Some of the major topics include generating and storing public private key pairs except 509 certificates, the public key infrastructure and how to implement all of this in code. By the end of this course, you'll be able to implement cryptographic security in your own projects. I hope you'll join me on this journey to learn asymmetric cryptography with the securing data with asymmetric cryptography course at plural site