Chapter 11. Using Asymmetric Encryption and PKI
THE FOLLOWING CCNA-SECURITY EXAM TOPICS ARE COVERED IN THIS CHAPTER:
Asymmetric encryption usage
Asymmetric algorithms and the computations behind them
The components of a PKI
Certificate authorities and their structures
Digital certificates creation, information and usage
PKI standards
We will then move into the Public Key Infrastructure (PKI), looking at the components of a PKI and how these components work together. Our discussion will then shift to digital certificates. We will outline the enrollment, usage, and information fields for digital certificates.
In the last section, we will look at some of the ...
Get CCNA® Security Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.