Public Key Infrastructure

Length: 00:17:24

Lesson Summary:

Asymmetric encryption uses two keys: one to encrypt and the other to decrypt. We can see this in a Public Key Infrastructure, or PKI. In this lesson, we'll take a look at how a PKI works.

This lesson is only available to Linux Academy members.

Sign Up To View This Lesson

Or Log In

Looking For Team Training?

Learn More