TLS01 - Security, configuration and attacks of protocol encryption overlays
N° TLS01
CYBERSECURITY
2 DAYS
- Understand and configure SSL/TLS protocol encapsulations
- Define the impact of a system or authentication vulnerability
- Understand the weaknesses and harden Windows / Active Directory environments
PROGRAM:
This course focuses on how to configure SSL/TLS protocol encapsulations at the application and network level. What are the best practices for choosing versions (SSL, TLS), cryptographic suites (symmetrical, asymmetrical and hash algorithms), the quality of certificates and the attacks against these protocols? SSL/TLS bindings, especially those around web technologies (HTTPS) can be further strengthened by flags, headers (HSTS, HPKP), DNS configurations (CAA), etc. All these aspects are summarized in this training course intended for application developers to apply increased security from the design phase, but also for system and network teams to reinforce the flows of the park.
System and network skills are required.
Category: cryptography.
Intended audience:
- System and network administrator
- CISO
- Developers
BOOK THE NEXT SESSION OF YOUR CHOICE
Click on the course of your choice
1200€ HT
Inter or intra companies
Presential or remote
Difficulty : All public
PARIS / RENNES