SSL/TLS Protocol and Handshake Process

Hack2Secure Training, Inspire,Induce,Innovate

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
5 Lessons (37m)
    • 1. Introduction

    • 2. Importance of Information Security

    • 3. Cryptography Overview

    • 4. PKI and Digital Certificates

    • 5. SSL/TLS Protocol and Handshake Process


Project Description

Learn more of Information Security concepts

Click below for Complete course on Information Security Concepts:

Information Security Concepts 

*** 50% OFF ***

Use Coupon Code 'UD50to enroll at exclusive 50% discount.



Enroll Now to get ..

Free exclusive access to e-book on 'Information Security Concepts', launching in August'15
Course Completion Certificate from Hack2Secure
Exclusive Pre-Sale and discount coupons for upcoming courses
.. and much more

In current world, Information is an important asset to everyone. In Business, where information plays a key role in success of any company. Business plans, customer database, product blueprints and road-maps are some of important example of information assets to any organization. At personal level, losing important files, leaked emails, passwords, misuse of Credit cards are some of the examples, which every individual fear of in free flowing world of Internet.

Information security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. This course provides overview on some of the basic concepts laying foundation for any secure system.

Under short but precise multiple video lectures, we will talk about some of information security concepts and possible attack scenarios compromising security of the system. Some of the discussed topics are Confidentiality, Integrity, Availability, Authentication, Authorization, Accountability, Cryptography, SSL/TLS protocols, Hashing, Digital Signatures, Password Security, Access Control mechanism and many more.

Along with this, a dedicated video lecture is provided on Security Design Principles. These principles concentrates on architectural structures, whether hardware or software, that are required to Support Information protection.


Why to take this course?

In current world, ensuring Information Security is one of the mandatory requirement. It doesn't matter, if you are an Administrator managing a single System or a complete Infrastructure, Tester or a Developer involved in product development or delivery to customer or anyone using internet for his personal purpose. This course talk about importance of ensuring Security and impacts of same, if it is not addressed properly.


How it can help you?

"Learn here, Apply anywhere", here we are learning pure concepts, free from any vendor specific device and feature. So, concepts learned here can be applied across all vendor devices and implementation.

"Build or Master a Skillset", since Information Security is one of the always in-demand and fastest trending domain in IT industry.

"Master the most misunderstood", Information Security is one of the most misunderstood in industry. Learning about IT Security pain-points, vulnerabilities and practices always help in analysing and testing associated fields.


Who can take this course?

This course has content for everyone, irrespective of expertise level, role and experience of an individual. It you are interested in either learning, building foundation or master Information Security Concepts and related implementations, this course is for you.


Student Projects