DE / EN

TOP LOC 1816 IP Security Workshop for End User

 

No later than by revealing the activities of the secret services by Edward Snowden the issue of "security" has arrived at the end user.

In the meantime, the encryption of the communication between the browser and the web server on the Internet has become self-evident. But how exactly does it work? What does it mean when the line in the browser turns green and / or a lock icon appears? What exactly are certificates, what are certification bodies for, what do you need public and private keys for, how to encrypt, digitally sign, authenticate, how secure is the whole thing and what does this security depend on?

The course provides not only answers to these and many other questions, but a comprehensive insight into the subject matter

Audience

End users who want to get an insight into the operation and use of certificates for the purpose of encrypting a communication.

Prerequisites

There are no prerequisites required.

Objectives

By participating in the workshop, safe handling of certificates is possible. The security and confidentiality of communications can be estimated and assessed

Methods

The workshop consists of a mixture of theory and practice. After various topics have been demonstrated, the participants have the opportunity to implement them themselves.

Content

The main focus of the workshop is the visual expression of the complex subject matter. Key topics are asymmetric encryption, operation and characteristics of key pairs, the path from the public key to the certificate, and the use of certificates to encrypt a communication.

• Cryptographic principles and terminology

• Symmetric encryption

• Asymmetric encryption

• Hash Algorithms (MD5, SHA-1, SHA-256)

• Hash-based Message Authentication Code (HMAC)

• Key pairs (public key, private key)

• Features and functions of key pairs

• cryptosystems (RSA, DSA)

• Key exchange with RSA

• Key exchange according to Diffie-Hellman

• Digital signature

• Authentication with keys

• From the public key to the certificate

• Certificate Signing Request (CSR)

• Certification bodies (CA)

• X.509 certificates

• Certificate chains, reasons for certificate chains

• Public Key Infrastructure (PKI)

• Important standards, X.500, X.509

• X.509 certificates, fields, and content

• Configuration of subscriber and Relying Party (web server and browser)

• Certificate formats and conversion (PEM, DER, PKCS # 7, PKCS # 12)

• Protocols (HTTPS, FTPS, SFTP, SRTP, SSH)

• Practical examples (web server, OpenSSL, SSH)

Duration

2 Tage

Dates

Dates on request

Certificate

Zertifikat der GRUNDIG AKADEMIE

Language

English