Employing Secure HTTPS

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
6 hours 42 minutes
Difficulty
Beginner
CEU/CPE
7
Video Transcription
00:00
>> This demonstration is going to show you how to
00:00
secure a service, specifically HTTP.
00:00
Now, if I could spell correctly,
00:00
we're going to use the sudo command.
00:00
We're going to install, APT install.
00:00
We're going to choose the attack,
00:00
why just means to say yes to the tiny questions.
00:00
We're going to install NGINX and
00:00
OpenSSL in case it's not previously installed.
00:00
I'll type in my password here.
00:00
Watch this installed pretty quickly because NGINX
00:00
is one of the very common web servers you also have,
00:00
of course Apache and others.
00:00
But in NGINX and Apache are probably
00:00
your two most common Linux web services at this time.
00:00
I'm going to go in, I'm going to edit
00:00
the localhost.configuration file.
00:00
I just cut and paste in the configuration file.
00:00
Now this is just a basic configuration at this point.
00:00
Now I'm going to generate a key using OpenSSL.
00:00
I'm going to copy both keys and certs in this case.
00:00
Here I copied the cert,
00:00
now I'm copying the key.
00:00
These two files are used in
00:00
conjunction with each other to
00:00
create a secure connection for the web service.
00:00
Now, back in the day
00:00
when even when I started web developing,
00:00
SSL certificates were very expensive.
00:00
But now with free services like Let's Encrypt,
00:00
every website is encrypted and
00:00
it's also because changing time security requirements.
00:00
Now here we have two separate portions
00:00
of the configuration file.
00:00
One for the secure and one for the unsecure.
00:00
I'm going to use Mozilla here, go to the local host.
00:00
You can see by based on
00:00
the lock that we actually have an SSL certificate.
00:00
Now it says it's unsecured
00:00
because it's a self-signed certificate.
00:00
But that's only reason is because it is self-signed.
00:00
Thanks for joining me in this lesson.
00:00
I look forward to seeing you in the next one.
Up Next
The Role of Network Scanning
6m
Finding Rogue Processes and Services
35m
Intrusion Detection and Prevention Systems
3m
Log Scanning
3m
Log Evaluation and Analysis
34m