Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this section, you'll observe a demonstration on the process of the public key/session key distribution transaction, or an Asymmetric Key Exchange (symmetric data exchange). You'll learn about Certificates of Authority (CA), how they are generated and validated, what comprises the certificate revocation list (CRL), what a online certification status protocol (OCSP) is, what their purposes are, and why they are each essential to the encryption process. We'll discuss the entire PKI (public key infrastructure) what role each of its components has. You'll learn the entire process from starts to finish, what the transaction consists of, what happened during the course of this transaction, what protocols are involved, how certificates and keys are assigned, and why this is a faster, more reliable encryption process.