Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In part nine of the Cryptography module, we continue our focus on Asymmetric Cryptography with a detailed diagram and discussion on secure public key exchange and how it works. You'll learn the entire process from start to finish and why it's a faster, more reliable encryption process. You'll also learn about Certificates of Authority (CA), what comprises the certificate revocation list (CRL), what a online certification status protocol (OCSP) is, and why they are each essential to the encryption process. We'll discuss the entire PKI (public key infrastructure) and what role each of its components has. And finally, we'll observe then explore what CA hashing looks like during encryption and decryption at the browser level, and learn why thorough PKI knowledge and training in Symmetric & Asymmetric Encryption for netadmins and cyber security professionals is essential.