Join Stephanie Domas for an in-depth discussion in this video Summary of exam expectations, part of Ethical Hacking: Cryptography.
- [Instructor] Public Key Infrastructure, … routinely just referred to as PKI, … is a term used to describe the entire ecosystem … associated with digital certificates and managing them. … It includes the hardware, the software, … the people, the policies and the procedures. … Under the hood it leverages RSA 1024 … to distribute public keys. … It's designed to handle the large complexities … associated with key management in large environments. … So how do you manage them, how do you distribute them, … how do you create them, use them, store them, revoke them? … All really critical pieces that need to be laid out … in large environments. … So what are the components that make up a PKI system? … The first is the certificate management system. … The certificate management system is responsible … for generating, distributing, storing of certificates. … The digital certificates themselves … establish the identity of a person. … They're the digital passport that proves … somebody is who they claim to be. …
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks