From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 23,500 courses taught by industry experts.
Examine a x.509 digital certificate
From the course: Ethical Hacking: Cryptography
Examine a x.509 digital certificate
- [Instructor] Let's build on that knowledge further. The premise of what we've been talking about is how do we move from the familiar insecure protocols such as HTTP, to more secure protocols such as HTTPS? Again, let's consider how you securely got to this LinkedIn site to begin with. I'm here in the browser on my LinkedIn page. To check to see if I'm using the highest level of security, I will double-click on the URL bar to fully expose my internet address. As you can see, I'm already leveraging HTTPS encryption. If not, I could easily add the S at the end of the HTTP and force a reload of my page to do so. Most websites these days are configured to automatically use HTTPS connections, even if you don't ask for it. This protocol simply adds a secret twist to web browsing, which redirects you to the secure version of the same site. That secret twist is the infamous TLS process. Let's go deeper since we are already here. Depending on your browser selection, you can now click on this…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Fundamentals of public key infrastructure (PKI)6m 9s
-
(Locked)
Fundamentals of public key infrastructure (PKI), continued8m 19s
-
(Locked)
Implementations of public key infrastructure (PKI)7m 7s
-
(Locked)
The SSL and TSL handshake process5m 13s
-
(Locked)
Examine a x.509 digital certificate4m
-
(Locked)
-
-
-