From the course: Ethical Hacking: Cryptography
Unlock the full course today
Join today to access over 23,500 courses taught by industry experts.
The SSL and TSL handshake process
From the course: Ethical Hacking: Cryptography
The SSL and TSL handshake process
- [Narrator] It's time to go behind the scenes and explain various implementations of PKI that you don't quite see, yet you make use of them every day. Let's look at the handshake process known as SSL/TLS. In fact, it's time to pause for a brief history lesson. SSL is an insecure predecessor of the latest version of TLS, which is now at 1.3. Although you may still see references to SSL, Google discovered major vulnerabilities around 2014, and as with everything else, it's been improved. This will be important if you see any exam answer choices that suggest not upgrading legacy systems that are still running SSL, or other insecure protocols, and you'll know right away this isn't a recommended path expected from your cybersecurity expert role. Now, let's look at the TLS handshake process. We have a client and a server needing to exchange secure information. Perhaps you need to search up information on Google from your computer. We know that each have their own public and private key…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
(Locked)
Fundamentals of public key infrastructure (PKI)6m 9s
-
(Locked)
Fundamentals of public key infrastructure (PKI), continued8m 19s
-
(Locked)
Implementations of public key infrastructure (PKI)7m 7s
-
(Locked)
The SSL and TSL handshake process5m 13s
-
(Locked)
Examine a x.509 digital certificate4m
-
(Locked)
-
-
-