Developers have to deal with certificates quite often. The are used by WEB servers and Web browsers, used to sign documents etc. This course introduces the practical aspects of public key cryptography. It shows the layout of certificates, the tools to manipulate them, how to obtain them, do key maintenance. Briefly touches on self signed certificates. Describes CA hierarchies and shows the Chain Building process. References to further literature.
Paul is an independent consultant and originally focused on technical software (robotics), then moved into (lower layers) network programming. Currently he sails the much murkier waters of Identity Management and Identity Federation, that way combining the interest in both programming and network infrastructure.