Secure Sockets Layer
Author
John Michael Pierobon
E-mail:
pierobon@pierobon.org
Web site:
http://www.pierobon.org/
Go to the outline of:
Chapter 0
Chapter 1
Chapter 2
Chapter 3
Chapter 4
Chapter 8
Chapter 9
Labs
Chapter 0
Course Introduction
Course Objectives
Intended Audience
Course Structure
Bookmarks
of all the external links that appear in the course.
Must have JavaScript enabled browser for interactive exercises to work.
Course Content
back to top
Chapter 1
Encryption 101
What Is Encryption
Encryption
Authentication
Privacy
Integrity
Accountability
Types Of Key Encryption
Private Key Encryption
Advantages And Disadvantages Of Secret Key Encryption
Categories Of Symmetric Key Encyption
Public Key Encryption
Types Of Public Key Encryption
Uses Of Public Key Encryption
Digital Signature
Message Authentication Code
Digital Certificate
Contents Of Digital Certificates
Certifying Authority
Man-In-The-Middle Attack
Key Agreement Protocol
Diffie-Hellman Key Agreement
Diffie-Hellman Implemented
Diffie-Hellman Example
RSA Encryption
RSA Public Key Encryption
Chapter 1 Review Questions
Chapter 1 Review
back to top
Chapter 2
SSL 101
History Of SSL
Current SSL Version
SSL Security
The OSI Model
SSL In The OSI Model
SSL Record Protocol
SSL Handshake Protocol
SSL Handshake Steps
SSL Handshake Steps In Detail
SSL Handshake Diagram
SSL Alert Protocol
Error Alerts
Change Cipher Spec Protocol
Cipher Suite
Chapter 2 Review Questions
Chapter 2 Review
back to top
Chapter 3
Enabling Secure Web Communications
https
Enable SSL On The Client
Verifying Installed Certificates
Enable SSL On The Server
Configure An Apache Web Server For SSL
Configure An IIS Web Server For SSL
How Many Digital Certificates
Criteria For Obtaining Digital Certificates
Information Needed To Verify The Identity
Self Signing Certificate
Enable Self Signing Certificates
Certificate Server
Chapter 3 Review Questions
Chapter 3 Review
back to top
Chapter 4
Using Microsoft Certificate Services
Steps To Secure Communications With IIS
Microsoft Certificate Services
Process Certificate Requests
Types Of Certifying Authorities
Enterprise Root CA
Enterprise Subordinate CA
Stand Alone Root CA
Stand Alone Subordinate CA
Install Certificate Services
Set Up Certificate Services
Which Machine
Machine Uptime
Other Considerations
Web Enrollment
Why Have Web Enrollment
Public And Private Key Pair
Key Length
Hash Algorithm
Configure The Indentifying Information
Certificate Lifespan
Storage
Location Of The Database
Issuer Policy Statement
CAPolicy.inf
Syntax
Chapter 4 Review Questions
Chapter 4 Review
back to top
Chapter 8
Secure Transactions
Clear Text
Clear Text Is A Problem
Capture Network Traffic
Encrypting Information
Public Key Encryption
Using Public Key Encryption
Digital Signature
Message Digest
Digital Certificate
Encryption Methods
Secure Transactions With Apache
Secure Sockets Layer
SSL And Web Browsers
SSL And Apache
SSL Directives
Commercial SSL Packages
Sources Of Strong Cryptography
Chapter 8 Review Questions
Chapter 8 Review
back to top
Chapter 9
Conclusion