From the course: SSL/TLS for Beginners: Securing Network Communications
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Hashing and digital signatures - Active Directory Tutorial
From the course: SSL/TLS for Beginners: Securing Network Communications
Hashing and digital signatures
- [Instructor] A big part of working with SSL and TLS includes hashing and digital signatures. These are methods that fall into the big picture of securing network communications. Let's define how that works. We'll start by talking about hashing. Hashing doesn't necessarily require a PKI certificate and it might not even be used for network communications. However, it can be. So it can be used to verify the integrity of network messages, or simply the integrity of files that are stored somewhere. And also to verify machine boot-up settings. When we say verify the integrity, what we mean is we want to make sure that these things have not been tampered with, they've not been modified by unauthorized parties. So hashing then doesn't provide data confidentiality that would be encryption. Hashing can also be used with SSL and TLS and we'll identify that a little bit later when we talk about digital signatures. Hashing uses a one-way algorithm that results in a unique value and that unique…
Contents
-
-
-
-
-
-
(Locked)
Hashing and digital signatures5m
-
(Locked)
Configure a website with a certificate5m 41s
-
(Locked)
Configure a web browser with a certificate5m 55s
-
(Locked)
Configure a code-signing certificate with Microsoft PowerShell11m 32s
-
(Locked)
Encrypting file system and certificates5m 26s
-
(Locked)
Configure a TLS VPN8m 12s
-
(Locked)
-