"The trainer is really engaging and super knowledgeable! The course is very interesting and all the content feels very useful and relevant, definitely no filler. I feel like I have a much better understanding of TLS and Internet PKI as a result, and the practical segments really help cement the understanding. Great course!"
HW, Senior Software Engineer, SSL/TLS, April 2021
Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. We will consider the essentials of Cryptography to give delegates a sound foundation for the rest of the course.
* CIA - Confidentiality, Integrity, Authentication
* Trust and Cryptography: Alice and Bob
* Cryptography Mathematics
* Block and Stream Algorithms
* Symmetric and Asymmetric Encryption
* Hashing
* Signing and encryption
* Cipher Suite
### Demos and practicals ###
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both frequently referred to as "SSL", are cryptographic protocols that provide communications security over a computer network.
This section will explain how cryptography and encryption in SSL is used to provide confidentiality, integrity and authenticity of the data transmitted.
* TLS Handshake (client - server)
* Trust: What to check?
* Cryptography: What to check?
* Applications: What to check?
### Demos and practicals ###
A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
* Trust and Certificates
* Certificate Authorities
* Certificate Revocation List and OCSP
### Demos and practical ###
In this section of the course we will discuss some of the real world issues that you can expect to encounter in a typical Enterprise environment.
* Problems and Attacks: Where? What?
* Attacks SSL handshake protocol
* Attacks SSL data protocol
* Attacks TLS
* Attacks PKI
* Exploits 1998 .. 2016
* SSL/TLS Problems
* Attacks by example (BEAST, CRIME, Heartbleed, LogJam, PUDDLE, DROWN, ...)
### Demos and practicals ###
* What to do?
* Can tools help?
### Demos and practicals ###
A range of practical tools are available to help Engineers check for and help prevent attacks. In this section we will take a close look at some of these, including pros and cons.
* Overview and Functionality
* Online tools
* CLI tools
* Types of tools
* Comparison and Traps
### Demos and practicals ###
* Exercise: analyse-ssl.pl, nmap, openssl, o-saft.pl, stunnel, sslmap.py, sslscan, sslyze.py, testssl.sh
It is often a challenge to use tools in development and for checking configurations or applications, in particular when there are legacy systems involved. Using the most up-to-date software is not always a wise choice. This section will describe some problems with tools and show how to install tools properly.
* What you need to know before installing
* How to install your tools
* OpenSSL: Quick Overview
* Perl modules
* Usage examples: nmap, openssl, O-Saft
### Demos and practicals ###
With the benefit of experience gained in the real world, we will provide delegates with some sound skills including tips and tricks of how to best implement the technology and tools in the Enterprise.
* In general
* Secure Server Design
* Server Certificate and Protocol
* Secure Client's Privacy
* Configuration: Protocol
* Configuration: Cipher Suite
* Configuration: Certificate
* Configuration: Web Server
* HSTS, CSP, Cookie
### Demos and practicals ###
Writing secure and robust software is difficult, even for developers with a lot expertise. This section will outline some principles for writing secure code. It will show general recipes for developers and administrator operating secure servers.
* Principles, In general
* Principles: Data Validation
* Principles: Certificate
* Principles: PKI
* Principles: Libraries and Frameworks
* Examples
### Demos and practicals ###
"The trainer is really engaging and super knowledgeable! The course is very interesting and all the content feels very useful and relevant, definitely no filler. I feel like I have a much better understanding of TLS and Internet PKI as a result, and the practical segments really help cement the understanding. Great course!"
HW, Senior Software Engineer, SSL/TLS, April 2021
“JBI did a great job of customizing their syllabus to suit our business needs and also bringing our team up to speed on the current best practices. Our teams varied widely in terms of experience and the Instructor handled this particularly well - very impressive”
Brian F, Team Lead, RBS, Data Analysis Course, 20 April 2022
Sign up for the JBI Training newsletter to stay updated with world-class technology training opportunities, including Analytics, AI, ML, DevOps, Web, Backend and Security. Our Power BI Training Course is especially popular. Gain new skills, useful tips, and validate your expertise with an industry-leading organisation, all tailored to your schedule and learning preferences.
Our SSL/TLS training course is focused on the tools and practical techniques needed by Engineers who work with SSL. It is led by an expert instructor who will guide you through Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), both of which are cryptographic protocols designed to provide communication security over a computer network.
Additionally public key infrastructure (PKI) will be covered in some detail to help you create, manage, distribute, use, store, and revoke digital certificates.
The course is very much run as a hands-on workshop with an emphasis on practical issues you can expect to encounter and how to properly check for these.
To enable this, delegates will be exposed to a broad range of tools available to those working in this field.
CONTACT
+44 (0)20 8446 7555
Copyright © 2024 JBI Training. All Rights Reserved.
JB International Training Ltd - Company Registration Number: 08458005
Registered Address: Wohl Enterprise Hub, 2B Redbourne Avenue, London, N3 2BS
Modern Slavery Statement & Corporate Policies | Terms & Conditions | Contact Us