Prepare to explore how hashing secures data, detects alterations, and maintains integrity. You’ll see real world examples, understand why collisions happen, and learn how different algorithms produce unique fixed sized digests.
MAC/HMAC – Data Integrity (04:06)
See how MACs and HMACs verify data integrity and authenticity using secret keys and hashing.
Symmetric Encryption (08:18)
Discover how symmetric encryption secures data using the same key for both encryption and decryption, offering fast and efficient protection.
Asymmetric Encryption (11:48)
Learn how asymmetric encryption uses public and private keys to secure data, ensuring confidentiality and authentication.
Public & Private Keys (09:28)
Learn how public and private keys work together to secure data through encryption, decryption, and authentication.
Digital Signature Algorithms (02:06)
Discover how DSA ensures data authenticity and integrity through secure digital signatures.
Key Exchange Algorithm (03:18)
Learn how key exchange algorithms like RSA and Diffie-Hellman securely establish shared secrets for encrypted communication.
Section 2: Certificates & Trust
What is the PKI? (06:10)
Discover how Public Key Infrastructure (PKI) establishes trust online through clients, servers, and Certificate Authorities working together to secure communications.
What is a Certificate? (15:27)
How do you know a website is secure and trustworthy? It all comes down to digital certificates. In this video, you’ll see how certificates verify identities, secure data, and build trust online.
Certificate Authorities & Their Role in Trust (06:07)
Ever wonder who decides which websites you can trust? In this video, we’ll break down how Certificate Authorities (CAs) create a chain of trust that secures your online connections.
Certificate Signing Request (04:21)
How does a server prove it’s trustworthy? It starts with a Certificate Signing Request. In this video, you’ll see how CSRs help secure online communication by linking a public key to a verified identity.
CRL’s & OCSP (07:06)
What happens when a digital certificate is no longer trustworthy? In this video, we’ll explore how CRLs and OCSP help detect revoked certificates, ensuring secure connections aren’t compromised
Section 3: Introduction to the SSL/TLS Handshake Process
Introduction to how the PKI is Used in SSL/TLS (03:11)
What’s really happening behind the scenes when you see that padlock in your browser? In this video, we’ll break down how PKI works with SSL/TLS to secure your online connections.
Introduction to the SSL/TLS Handshake (03:11)
How do two devices create a secure connection in just seconds? In this video, we’ll walk through the SSL/TLS handshake and show how trust is established to keep your data safe.