From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Fundamentals of public key infrastructure (PKI), continued
From the course: Ethical Hacking: Cryptography
Fundamentals of public key infrastructure (PKI), continued
- [Instructor] Let's take a deeper look at the Certificate Authority, or CA. It operates as a trusted introducer, which was the role played by Domain 2 in our example earlier. The CA is primarily responsible for issuing, revoking, and distributing digital certificates. A CA is vouching for the certificate's owner's identity in the same way as having a government issued ID or passport verified. There are several trusted third party organizations you might be thinking of who act as CAs. We have GlobalSign, Verisign, Entrust, GoDaddy, and hundreds more out there across the globe who charge a fee, of course, to help you decide who are you going to trust. However, companies can also have in-house CAs, or you can create a self-signed certificate on your own certificate server as well. These are most used in limited self-controlled testing scenarios. As you could imagine, this is a lot of work for CA to do alone. That's why it needs the help of the Registration Authority, or RA. Now the RA…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Fundamentals of public key infrastructure (PKI)6m 9s
-
(Locked)
Fundamentals of public key infrastructure (PKI), continued8m 19s
-
(Locked)
Implementations of public key infrastructure (PKI)7m 7s
-
(Locked)
The SSL and TSL handshake process5m 13s
-
(Locked)
Examine a x.509 digital certificate4m
-
(Locked)
-
-
-