
자동차 개발 프로세스 (ASPICE)
윤우주
자동차 국제 표준 프로세스 모델 ASPICE에 대해 이해하고 학습합니다.
입문
automotive, 소프트웨어 설계, 소프트웨어 테스트
Understand the basics of security algorithms and certificates, and learn about TLS based on this.
Understanding TLS
TLS 1.2 vs TLS 1.3
Certificate
Security Algorithm Basics - Two-way Encryption (Symmetric Key, Asymmetric Key)
Security Algorithm Basics - One-Way Encryption (Hash)
The purpose of this lecture is to provide a certificate and TLS lecture designed to help you understand TLS based on an understanding of security fundamentals algorithms and certificates.
As someone who works in cybersecurity, I believed that understanding TLS would be equivalent to understanding the fundamentals of cybersecurity. Accordingly, I designed the course to cover fundamental security concepts, algorithms, and certificates, analyze TLS packets, and learn about TLS.
※ This lecture overlaps with the Automotive Cybersecurity lecture (one-way encryption, two-way encryption).
--> Students taking this course can take the course at a discounted price by using the bulletin board coupon.
Lecture Purpose and Objectives
Lecture topic
TLS is an Internet security protocol designed to ensure security between web servers and clients. When transmitting and receiving data between web servers, it is encrypted to prevent hackers from intercepting and using it. Therefore, both the server and client must authenticate each other to ensure trustworthiness, a process known as the "handshake ."
The Handshake process applies several security algorithms, and to help you understand each step, I have included a basic understanding of security algorithms and explained them in my own way in the lecture.
For cybersecurity purposes
Security Algorithm Fundamentals - Learning and Practicing One-Way Encryption
Security Algorithm Fundamentals - Learning and Practicing Two-Way Encryption
Certificate Learning and Practice
Understanding TLS - A Step-by-Step Analysis of the Handshake Process
TLS 1.2 vs. TLS 1.3
Those who need to accumulate security basics
Symmetric key? Asymmetric key? Certificate?
How do each security algorithm work? I want to know exactly how a certificate is structured!
For those who need to understand TLS
They say TLS 1.3 has been implemented. What is TLS 1.3? How does this Internet security protocol encrypt data for transmission and reception?
Anyone who needs TLS for product development
I'm starting a new project and I need to use TLS for internet security. Could you tell me about TLS?
Learning Cybersecurity Concepts
Learning the Basics of Cybersecurity Algorithms
HASH
AES
RSA
Certificate
Understanding the TLS Handshake
TLS 1.2 Handshake
TLS 1.3 Handshake
TLS-related security algorithms
Learn about the background and structure of certificate use. In real life, certificates are issued by institutions to authenticate us, similar to public certificates and financial certificates. Learn about the structure, chain structure, and format of TLS certificates, and solidify your understanding through hands-on practice.
Learn about the reasons and concepts behind TLS implementation. While TLS 1.3 is currently the latest version, not all protocols use it. Furthermore, if you examine packets, you'll see that they all use TLS 1.2. This lecture will explain why this is the case, as well as the exact differences between TLS 1.2 and TLS 1.3, and explore the overall TLS flow.
Practice with OpenSSL
I believe the best way to learn concepts is through hands-on practice, grounded in theoretical understanding. I aim to help you fully understand the concepts learned in lectures by directly applying them. The exercises will utilize the open-source cryptographic library OpenSSL.
Handshake Step-by-Step Analysis
TLS is a protocol for transmitting and receiving encrypted data. However, prior to transmission and reception, a handshake process is required, where the server and client authenticate each other and create a session key. This process is analyzed step-by-step.
Hello. I'm Woojoo Yoon, a knowledge sharer. I work as a software developer in the automotive industry!
Development of a model by automaker V
Model development by automaker H
Model development by automobile manufacturer J
Who is this course right for?
Those who need to establish basic concepts of security algorithms
Anyone who needs to understand certificates
For those who need to understand TLS
Anyone who wants to learn the principles of secure network protocols
All
12 lectures ∙ (3hr 13min)
Course Materials:
10. TLS 1.2
33:32
11. TLS 1.3
24:10
$38.50
Check out other courses by the instructor!
Explore other courses in the same field!