For asymmetric encryption, you’ll need the public and private key pair for successful encryption and decryption. In this video, I’ll demonstrate the creation of a public and private key pair.
If you have a large number of devices using a public key infrastructure, you’ll need a way to manage all of the keys in the infrastructure. In this video, you’ll learn about public key infrastructures and the key management lifecycle.
Asymmetric encryption uses two different keys to provide a secure channel. In this video, you’ll learn how public keys and private keys can be used to encrypt data, create digital signatures, and create a secure symmetric key.
Our encryption methods will generally use either symmetric encryption or asymmetric encryption, and sometimes both! In this video, you’ll learn the advantages and disadvantages when using symmetric or asymmetric encryption types.
This month; public-key cryptography, multiple gateways on a single host, packet filtering vs. stateful inspection, and understanding IP classes.