SSL/TLS Protocol and Handshake Process
3.8 (411 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,236 students enrolled
Wishlisted Wishlist

Please confirm that you want to add SSL/TLS Protocol and Handshake Process to your Wishlist.

Add to Wishlist

SSL/TLS Protocol and Handshake Process

Demystifying SSL/TLS protocol Handshake process
3.8 (411 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
8,236 students enrolled
Last updated 3/2017
English
Price: Free
Includes:
  • 37 mins on-demand video
  • 1 Article
  • 1 Supplemental Resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • "Learn here, Apply anywhere", here we are learning pure concepts, free from any vendor specific device and feature. So, concepts learned here can be applied across all vendor devices and implementation.
  • "Build or Master a Skillset", since Information Security is one of the always in-demand and fastest trending domain in IT industry.
  • "Master the most misunderstood", Information Security is one of the most misunderstood in industry. Learning about IT Security pain-points, vulnerabilities and practices always help in analyzing and testing associated fields.
  • Learn Information Security Basic Concepts
  • About SSL/TLS protocol and its detailed Handshake process
View Curriculum
Requirements
  • Student must know how to atleast use a Computer System and make use of Internet :)
Description

In current world, Information is an important asset to everyone. In Business, where information plays a key role in success of any company. Business plans, customer database, product blueprints and road-maps are some of important example of information assets to any organization. At personal level, losing important files, leaked emails, passwords, misuse of Credit cards are some of the examples, which every individual fear of in free flowing world of Internet.

Information security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. This course provides overview on some of the basic concepts laying foundation for any secure system.

Under short but precise multiple video lectures, we will talk about some of information security concepts and possible attack scenarios compromising security of the system. Some of the discussed topics are Cryptography, PKI, Digital Certificates, SSL/TLS protocols and many more.

Who is the target audience?
  • In current world, ensuring Information Security is one of the mandatory requirement. It doesn't matter, if you are an Administrator managing a single System or a complete Infrastructure, Tester or a Developer involved in product development or delivery to customer or anyone using internet for his personal purpose. This course talk about importance of ensuring Security and impacts of same, if it is not addressed properly.
  • Network and System Administrator, QA Engineer, Developer
  • Security Engineer, Security Auditor, Security Testing Engineer
  • Managers, Decision makers
  • Students, Fresh College Graduates
  • Job-seekers...
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 6 Lectures Collapse All 6 Lectures 37:35
+
Introduction to Information Security Concepts
2 Lectures 12:12

In present world, ensuring Information Security is one of the mandatory requirement. It doesn't matter, if you are an Administrator, managing a single system or a complete infrastructure, Tester or a Developer, involved in a product development or delivery to customer or even an end-user using internet for his personal purpose.

In current video, we will walk through some of the Information Security topics to be covered as part of this course.

Introduction
02:45

Current video talks about, Information Security and its importance in IT industry. Along with this, we will also talk about 'Return of Investment' (ROI) from Security point of view.

Importance of Information Security
09:27
+
SSL/TLS Protocol and Handshake process
3 Lectures 25:07

In current video we will talk about Cryptography process, its types (Symmetric & Asymmetric) and how it is used to ensure Confidentiality of Information.

Cryptography
08:40

In current Video, we will talk about Public Key Infrastructure and how it is used for Key Management. Along with this, we will also discuss about Digital Certificates and their purpose.

PKI and Digital Certificates
06:01

Current video, talks about basic concepts related with TLS/SSL protocol and how its handshake process make effective use of PKI for key distribution.

SSL/TLS Protocol and Handshake Process
10:26
+
PearsonVUE Secure SDLC Exam (SWADLP) Challenge Program
1 Lecture 00:19
Learn More: Candidate Reference Guide
00:19
About the Instructor
Hack2Secure Training
4.1 Average rating
626 Reviews
12,007 Students
3 Courses
IT Security Training

Hack2Secure is an expert team of Certified Information Security Professionals, who have years of experience in the exciting field of IT Security. We believe and understand the needs of today's IT professionals and is best positioned to offer world class Security Training & Professional Services in Information Security.

Hack2Secure is one of the few companies who offer wide range of theoretical and practical security training programs that can help a diverse group of people, from College Students to Corporate Professionals. We believe in knowledge sharing and transfer. Our experienced trainers will provide you the required knowledge of tools, techniques and resources along with guidance, so that you could be at the forefront of a vital and rapidly changing IT industry.