Traditional cryptography uses a secret key for encrypting and decrypting a message. This is also known as a symmetric key. In public key cryptography, the CA creates private and public keys using the same algorithm, but it functions asymmetrically.
In this Cryptography course you will discuss public key infrastructures, certificate authorities, and certificate management. We will combine that with in-depth demos on PKI Installation, CRL, Certificate Enrollment, and CA Management. We will discuss the steps to create and manage a public key infrastructure, and the relationship between public key infrastructures and certificate authority, as well as both traditional cryptography and public key cryptography, the implementation of certificates, and managing certificates.
Topics Covered Include:
Take Advantage of our extra downloadable supplemental materials.
**This .zip file includes PDF versions of our Script, PPT Slides, Quiz Questions, and vocabulary tools to better enhance your understanding for Cryptography.