Chapter 11. Using Asymmetric Encryption and PKI

THE FOLLOWING CCNA-SECURITY EXAM TOPICS ARE COVERED IN THIS CHAPTER:

  • Asymmetric encryption usage

  • Asymmetric algorithms and the computations behind them

  • The components of a PKI

  • Certificate authorities and their structures

  • Digital certificates creation, information and usage

  • PKI standards

Using Asymmetric Encryption and PKI

We will then move into the Public Key Infrastructure (PKI), looking at the components of a PKI and how these components work together. Our discussion will then shift to digital certificates. We will outline the enrollment, usage, and information fields for digital certificates.

In the last section, we will look at some of the ...

Get CCNA® Security Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.