From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 3 Information Security Program
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
TLS and SSL
- [Instructor] Digital certificates allow for the secure exchange of public encryption keys over otherwise untrusted networks. Transport encryption technology, such as Transport Layer Security or TLS, uses those digital certificates to facilitate secure communication over public networks. Let's explore TLS by describing the process that two systems follow when they want to set up an encrypted session that's protected by TLS. First, the client sends a request to the server, asking that the server initiate a secure session. This request includes a list of cipher suites supported by the client. Now it's important to understand that TLS is only a protocol that uses other cryptographic algorithms. TLS is not a cryptographic algorithm itself. Therefore, you can't encrypt something with TLS. You can use TLS to apply other encryption algorithms. The listing of cipher suites sent by the client to the server is a laundry list…
Contents
-
-
-
-
-
-
-
-
Understanding encryption2m 49s
-
(Locked)
Symmetric and asymmetric cryptography4m 18s
-
(Locked)
Goals of cryptography3m 47s
-
(Locked)
Choosing encryption algorithms3m 27s
-
(Locked)
The cryptographic lifecycle2m 34s
-
(Locked)
Key exchange2m 49s
-
(Locked)
Diffie-Hellman4m 33s
-
(Locked)
Key escrow2m 58s
-
(Locked)
Key stretching1m 43s
-
(Locked)
Trust models2m 52s
-
(Locked)
PKI and digital certificates4m 5s
-
(Locked)
Hash functions7m 38s
-
(Locked)
Digital signatures3m 51s
-
(Locked)
TLS and SSL5m 4s
-
(Locked)
IPsec2m 49s
-
(Locked)
Securing common protocols7m 58s
-
-
-
-
-
-
-
-