Course Curriculum

    1. Meet the Instructor

    2. Course Content

    1. Section Topics

    2. 1- Data & Cryptography

    3. 2- Confidentiality & Encryption

    4. 3- Integrity & Digital Signing

    5. 4- Authenticity & Digital Certificates Introduction

    6. 5- The Concept of Authenticity & Digital Certificates

    7. 6- PKI Terms & Definitions

    8. 7- Certificate Signing Process

    9. 8- PKI & Certificate Authentication

    10. 9- Demo: Trusted CAs root certificates stores on Windows & Mac OS

    11. 10- PKI - The Need for Intermediate Certificates

    12. 11- Demo: The Certificate Trust Chain Shown in a Browser & using a Packet Capture

    13. 12- Authority vs Non-Authority Certificates

    14. 13- Demo: Showing Certificate Fields in a Browser & using a Packet Capture

    15. 14- Static Key Pair & CSR Generation using RSA

    16. 15- Demo: Static Key Pair & CSR Generation using RSA

    17. 16- Static Key Pair & CSR Generation using ECDSA

    18. 17- Demo: Static Key Pair & CSR Generation using ECDSA

    19. 18- The ECDSA Public Key

    20. 19- Comparison between ECDSA & RSA

    21. 20- Non-Repudiation

    22. 21- Bringing Cryptography Concepts together

    1. TLS1.3 Section Topics

    2. 1- What is TLS 1.3

    3. 2- TLS 1.3 Session Stages

    4. 3- TLS 1.3 Session Setup Stage Topics

    5. 4- Exchanging Cipher Suites During TLS 1.3 Handshake

    6. 5- Demo: TLS Version & Cipher Suite Agreements in a Packet Capture

    7. 6- Cipher Suite Agreement

    8. 7- Ephemeral Keys Generation in TLS 1.3

    9. 8- Demo: Ephemeral Keys Generation & Certificate Verify Message in a Packet Capture

    10. 9- Cipher Suites Supported by TLS 1.3

    11. 10- TLS 1.3 Session Key Generation using ECDHE

    12. 11- Initialisation Vector Generation using ECDHE

    13. 12- TLS 1.3 Encrypted Data Flow Stage

    14. 13- TLS 1.3 & The Use of AEAD

    15. 14- HMAC

    16. 15- AEAD Cipher Modes

    17. 16- The Use of XOR Operation in Encryption

    18. 17- CHACHA20_POLY1305 & Message Encryption

    19. 18- AES256_GCM & Message Encryption

    20. 19- CHACHA20_POLY1305 or GCM, When to Use Which

    21. 20- Replay Attack Prevention Using Additional Data in AEAD

    22. 21- Demo: Showing the Message Authentication TAG in a Packet Capture

    1. TLS 1.2 Section Topics-

    2. 1- TLS 1.2 Session Stages

    3. 2- Session Setup Stage - Topics

    4. 3- TLS 1.2 Session Setup Stage

    5. 4- Demo: TLS Version & Cipher Suite Agreements in a Packet Capture

    6. 5- Ephemeral Keys Generation & Key Signing in TLS 1.2

    7. 6- Demo: Ephemeral Keys & Signed Server's Public Ephemeral Key in a Packet Capture

    8. 7- Cipher Suites Supported by TLS 1.2

    9. 8- TLS 1.2 Session Key Generation using ECDHE

    10. 9- TLS 1.2 Encrypted Data Flow Stage

    1. Section Topics

    2. 1- Faster Key Exchange in TLS 1.3

    3. 2- PFS & The Discontinuation of RSA Support

    4. 3- LogJam Attack in TLS 1.2

    5. 4- Prevention of LogJam Attack in TLS 1.3

    6. 5- TLS 1.3 is Ready for Implementing Quantum Computer Security

    1. 1- Taking a Decrypted Packet Capture in Mac OS

    2. 2- Demo: Taking a Decrypted Packet Capture in MAC OS

    3. 3- Taking a Decrypted Packet Capture in Windows

    4. 4- Demo: Taking a Decrypted Packet Capture in Windows

About This Course

  • $34.99
  • 90 lessons
  • 4 hours of video content
  • 7 Handy PDF Files
  • SET THE FOUNDATIONS

    Explore the Four Pillars of Cybersecurity: Confidentiality, Integrity, Authenticity, and Non-Repudiation. Understand how TLS fortifies these pillars, making it a cornerstone of web security. Dive deep into essential concepts such as Hashing, Signing, Symmetric and Asymmetric Encryption, and Public Key Infrastructure (PKI).

  • Unleash the Power of TLS

    Discover TLS 1.3 and its advanced mechanisms for key generation and exchange. Delve into cutting-edge AEAD protocols, including CHACH20-POLY1305 and AES256-GCM. Compare TLS 1.3 with its predecessor, TLS 1.2, understanding the advantages of the former over the latter.

  • Practical Applicationass

    Learn how to configure your NGINX web server efficiently with TLS 1.2 and TLS 1.3. Master the intricacies of certificate revocation and set up the process seamlessly on NGINX. Gain expertise in different certificate types and formats, allowing you to make informed decisions about your web security.

Secure the Digital World

Whether you're a cybersecurity enthusiast, a web developer, or an IT professional, this bootcamp equips you with the knowledge and skills to protect data and ensure secure web communication.