From the course: CompTIA Network+ (N10-009) Cert Prep
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Digital certificates with public key infrastructure (PKI)
From the course: CompTIA Network+ (N10-009) Cert Prep
Digital certificates with public key infrastructure (PKI)
- One of the big challenges to using asymmetric encryption is the fact that, well, if you're going to do asymmetric encryption, you're going to generate a public, public keys will be red this time, and a private key. So you're going to generate this key pair. Now, in this particular example, let's say that I am a web server and I own a company called Total Seminars, and the website is www.totalsem.com, and I want people to be able to buy stuff on my website. So I want to set up a secure web server. So in the most simple world, what I would do is I would generate a public and private key pair, and anytime anybody logged into my website, I would automatically just send them this public key, and then that way we could start asymmetric encryption. Well, that's a problem, that's a big problem. The problem with asymmetric encryption is the public key. If you get a public key from somebody, and by the way, when you log into a secure website, when you type in https:/www.ebay.com, you…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Introduction to structured cabling4m 3s
-
(Locked)
Terminating structured cabling7m 39s
-
(Locked)
Equipment room7m 5s
-
(Locked)
Alternative distribution panels3m 36s
-
(Locked)
Using a toner and probe2m 31s
-
(Locked)
Testing cable8m 39s
-
(Locked)
Troubleshooting cabling, part 14m 5s
-
(Locked)
Troubleshooting cabling, part 23m 34s
-
(Locked)
Troubleshooting cabling, part 39m 44s
-
-
-
Introduction to IP addressing and binary12m 28s
-
(Locked)
Introduction to ARP3m 32s
-
(Locked)
Subnet masks14m 4s
-
(Locked)
Classful addressing10m 6s
-
(Locked)
Subnetting with CIDR9m 32s
-
(Locked)
More CIDR subnetting practice9m 43s
-
(Locked)
Dynamic and static IP addresses7m 19s
-
(Locked)
Special IP addressing6m 47s
-
(Locked)
IP addressing scenarios14m 33s
-
-
-
Introduction to routers15m 4s
-
(Locked)
Network address translation (NAT)6m 10s
-
(Locked)
Implementing NAT2m 23s
-
(Locked)
Forwarding ports17m 26s
-
(Locked)
Tour of a SOHO router11m 48s
-
(Locked)
SOHO vs. enterprise8m 28s
-
(Locked)
Static routes12m 25s
-
(Locked)
Dynamic routing10m 22s
-
(Locked)
Open shortest path first (OSPF)3m 19s
-
(Locked)
Border gateway protocol (BGP)5m 25s
-
(Locked)
Enhanced interior gateway routing protocol (EIGRP)8m 10s
-
(Locked)
First hop redundancy protocol (FHRP)7m 56s
-
-
-
TCP and UDP7m 9s
-
(Locked)
ICMP and IGMP5m 55s
-
(Locked)
Explaining traffic types4m 44s
-
(Locked)
Handy tools6m 30s
-
(Locked)
Wireshark protocol analyzer10m 25s
-
(Locked)
Introduction to netstat7m 31s
-
(Locked)
File transfer protocol (FTP)9m 56s
-
(Locked)
Email servers and clients9m 7s
-
(Locked)
Securing email5m 34s
-
(Locked)
Telnet and SSH9m 2s
-
(Locked)
Network time protocol (NTP)4m 46s
-
(Locked)
Network service scenarios9m 20s
-
-
-
Making TCP/IP secure4m 12s
-
(Locked)
Identification7m 55s
-
(Locked)
Access control4m 7s
-
(Locked)
RADIUS and TACACS+4m 45s
-
(Locked)
Single sign-on (SSO)7m 25s
-
(Locked)
Symmetric encryption5m 19s
-
(Locked)
Asymmetric encryption3m 7s
-
(Locked)
Digital certificates with public key infrastructure (PKI)13m 33s
-
-
-
(Locked)
Switch management8m 49s
-
(Locked)
Introduction to VLANs10m 7s
-
(Locked)
InterVLAN routing2m 56s
-
(Locked)
Configuring switching technologies7m 25s
-
(Locked)
Trunking7m 39s
-
(Locked)
Cisco commands9m 2s
-
(Locked)
Switch port protection6m 28s
-
(Locked)
Port mirroring3m 19s
-
(Locked)
IDS vs. IPS4m 15s
-
(Locked)
Proxy servers12m 31s
-
(Locked)
Load balancing8m 19s
-
(Locked)
Device placement scenarios12m 37s
-
(Locked)
-
-
(Locked)
Understanding IP tunneling5m 50s
-
(Locked)
WAN technologies5m 29s
-
(Locked)
Content delivery networks (CDNs)1m 22s
-
(Locked)
Quality of service (QoS) and time to live (TTL)4m 42s
-
(Locked)
Understanding satellite networking2m 16s
-
(Locked)
Understanding cellular networking3m 49s
-
(Locked)
Remote desktop connectivity4m 19s
-
(Locked)
Virtual private networks (VPNs)10m 37s
-
(Locked)
Troubleshooting network services9m 28s
-
(Locked)
-
-
(Locked)
Introduction to 802.1111m 25s
-
(Locked)
802.11 standards5m 29s
-
(Locked)
Frequency, guest, and authentication options3m 44s
-
(Locked)
Power over ethernet (PoE)3m 30s
-
(Locked)
Common performance issues6m 17s
-
(Locked)
Troubleshooting interface issues10m 2s
-
(Locked)
Antennas8m 25s
-
(Locked)
Wireless security standards5m 53s
-
(Locked)
Implementing wireless security6m 43s
-
(Locked)
Threats to your wireless network6m 49s
-
(Locked)
Enterprise wireless5m 54s
-
(Locked)
Installing a wireless network14m 31s
-
(Locked)
Wireless scenarios5m 59s
-
(Locked)
More wireless scenarios8m 37s
-
(Locked)
-
-
(Locked)
Internet of Things (IoT) and Industrial Internet of Things (IIoT)8m 42s
-
(Locked)
Industrial control systems (ICS) and SCADA8m 29s
-
(Locked)
What are network operations?3m 10s
-
(Locked)
Encryption key management6m 7s
-
(Locked)
Configuration management5m 52s
-
(Locked)
Documentation7m 6s
-
(Locked)
Documenting the datacenter7m 34s
-
(Locked)
Patching and updating7m 7s
-
(Locked)
Disaster recovery and backups12m 23s
-
(Locked)
-
-
(Locked)
Security concepts5m 52s
-
(Locked)
Defense in depth (DiD)5m 12s
-
(Locked)
Rogue DHCP servers3m 45s
-
(Locked)
Denial of service (DoS) and distributed denial of service (DDoS)9m 48s
-
(Locked)
On-path attacks21m 55s
-
(Locked)
VLAN hopping6m 5s
-
(Locked)
Lifecycle management10m 3s
-
(Locked)
Malware6m 7s
-
(Locked)
Social engineering7m 33s
-
(Locked)
Logical security4m 54s
-
(Locked)
Physical security12m 30s
-
(Locked)