Learn about the PKI certificate hierarchy from root CAs to subordinate CAs to certificates issued to users, devices, and software.
- [Narrator] Securing network communications…with SSL and TLS begins with the public key…infrastructure hierarchy.…PKI, or public key infrastructure,…is a collection, or hierarchy,…of digital security certificates.…And these certificates, among other data that we will…define later, contain public keys.…Also, certificates might also contain mathematically…related private keys,…and we'll discuss the function of those keys in a bit…more depth, later on.…
Private keys, if they're not stored in the certificate…can also be stored in a separate file.…PKI components include the certificate authority, or the CA.…This component is used to issue new certificates,…to users or devices, or applications.…It can also renew certificates before they expire.…It can also revoke certificates, perhaps due to a…compromised smart phone that might have had a…secured certificate installed on it.…The CA also maintains the certificate revocation list,…the CRL, which is essentially a list of serial numbers…for revoked certificates.…
And also the certificate authority can be taken off line…
Author
Released
2/21/2019- Symmetric and asymmetric encrypting
- How certificates are issued and managed
- Configuring a Linux OpenSSL PKI environment
- How TLS supersedes SSL and is considered more secure
- Acquiring a web server certificate
- Acquiring a code-signing certificate
- Configuring a website with a certificate
- Securing files and folders with EFS
- Configuring a TLS VPN
Skill Level Beginner
Duration
Views
Related Courses
-
Learning Cryptography and Network Security (2015)
with Lisa Bock1h 45m Intermediate
-
Introduction
-
What you should know2m 5s
-
1. PKI Overview
-
Cryptography overview4m 47s
-
PKI hierarchy4m 47s
-
Certificate authorities6m 29s
-
Certificates8m 11s
-
-
2. PKI CA Implementation
-
3. PKI Certificate Acquisition
-
SSL vs. TLS9m 50s
-
-
4. PKI Certificate Usage
-
Configure a TLS VPN8m 12s
-
Conclusion
-
Next steps1m 9s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: PKI hierarchy