Course page: https://www.feistyduck.com/training/practical-tls-and-pki
Learn how to deploy secure servers and encrypted web applications and understand theory and practice of Internet PKI. Author: Ivan Ristić
If you are based in the UK and would like to attend this training, please email us to book your place.
Designed by the author of the much acclaimed Bulletproof SSL and TLS, this practical training course will teach you how to deploy secure servers and encrypted web applications and understand both the theory and practice of Internet PKI. On Days 1 and 2, we’ll focus on what you need in your daily work to deliver best security, availability and performance. And you will learn how to get an A+ on SSL Labs! On Days 3 and 4, we will start with the basics and the theory of Internet PKI, then discuss how the PKI is implemented in the real world, and finish with a practical example of a realistic private certification authority.
The training will ve delivered by Scott Helme via Zoom and our virtual labs.
This course is for system administrators, developers, and IT security professionals who wish to learn how to deploy secure servers and encrypted web applications and understand the theory and practice of Internet PKI.
Level: Intermediate
Duration: 4 days, 3.5 hours a day
Extras: Digital training materials and a digital copy of Bulletproof SSL and TLS
About a month prior to the course we'll send you a digital copy of Bulletproof SSL and TLS, our comprehensive guide to SSL/TLS and Internet PKI. A few days before the training, we'll send you a bunch of exercises and slides, access details for your virtual server and joining instructions for the Zoom sessions.
1. Introduction
a. The need for network encryption
b. Understanding encrypted communication
c. The role of public key infrastructure (PKI)
d. SSL/TLS and Internet PKI threat model
2. Keys and certificates
a. RSA and ECDSA: selecting the right key algorithm and size
b. Certificate hostnames and lifetime
c. Practical work:
i. Private key generation
ii. Certificate Signing Request (CSR) generation
iii. Self-signed certificates
iv. Obtaining valid certificates from Let’s Encrypt
d. Sidebar: Revocation
3. Protocols and cipher suites
a. Protocol security
b. Key exchange strength
c. Forward security
d. Cipher suite configuration
e. Practical work
i. Secure web server configuration
ii. Server testing using SSL Labs
f. Sidebar: Server Name indication (SNI)
g. Sidebar: Performance considerations
4. HTTPS topics
a. Man-in-the-middle attacks
b. Mixed content
c. Cookie security
d. CRIME: Information leakage via compression
e. HTTP Strict Transport Security
f. Content Security Policy
g. HTTP Public Key Pinning
h. Practical work:
i. Deploying HSTS to deploy robust encryption
ii. Deploying CSP to deal with mixed content
5. Putting it all together: Getting an A+ in SSL Labs
1. Introduction
2. Standards
a. X.509 certificates
b. Certificate chains
c. Name constraints
d. Trust path building
e. Validation process
3. Internet PKI
a. Certification Authorities
b. Relying parties
c. Certificate types (DV, EV, OV)
d. Certificate lifecycle (validation, issuance, and revocation)
e. CA/B Forum and its standards
f. Weaknesses
g. History of attacks
4. Revocation
a. CRL
b. OCSP
c. OCSP stapling
d. CRLsets and OneCRL
e. Short-lived certificates
5. Defenses
a. Certification Authority Authorization (CAA)
b. Public Key Pinning
i. Static pinning
ii. HPKP
iii. DNSSEC/DANE
6. Certificate Transparency
7. PKI ecosystem monitoring
i. SSL Pulse
ii. Censys
iii. crt.sh
8. Project: Building and deploying a realistic private CA
We will also provide you with many additional exercises that you can work on in your own time. You'll be able to ask us for help via email. And if you're already familiar with the basics, we'll challenge you with some of the advanced exercises on the day.
Scott Helme is a Microsoft MVP, Security Researcher, and International Speaker, often found in the press or blogging onlineabout cyber security. He has delivered training on hacking and encryption for over 7 years and believes training courses should be fun and hands-on.
Founder of Report URI, Security Headers, and other popular projects, Scott has a tendency to always be heavily involved in something security focused!
Ivan Ristić writes computer security books and builds security products. His book Bulletproof TLS and PKI, the result of more than a decade of research and study, is widely recognised as the de facto SSL/TLS and PKI reference manual. His work on SSL Labs made millions of web sites more secure. Before that, he created ModSecurity, a leading open-source web application firewall.
More recently, Ivan founded Hardenize—now part of Red Sift—as a platform for continuous discovery and monitoring of network infrastructure.
Feisty Duck's Terms and Conditions and Privacy Policy apply to this training.
Where can I contact the organiser with any questions?
Contact us at training@feistyduck.com with any questions about the event.
What is the refund policy?
Any cancellation by you must be made by emailing training@feistyduck.com.
You may cancel or reschedule a course subject to the following charges:
Other dates?
Can't make this date? Tickets sold out? Email training@feistyduck.com to be notified about the future dates.