Transport Layer Security (TLS) evolved from Secure Socket Layers (SSL) which was originally developed by Netscape Communications Corporation to secure web sessions. However, the primary goal of the TLS protocol is to provide privacy and data integrity between two communicating applications.
The objective of this tutorial is to compare SSL and TLS protocols by explaining various tools and strategies to enhance security for network-centric applications or communication.
This online tutorial is fee-free.
Engineers, Network Managers and Operators, and Security policy makers who are interested in network security and want to gain an understanding of how TLS can be used to improve security.
It is assumed that participants have a basic understanding of:
- Network operations, Internet technologies, OSI reference model and TCP/IP.
- Basic Linux command line (CLI) skills.
We recommend the following Academy courses be completed before the start of the tutorial:
- Network security fundamentals: https://academy.apnic.net/en/webinar-courses/network-security-fundamentals/
- Introduction to Cybersecurity: https://academy.apnic.net/en/course/introduction-to-cybersecurity/
- Public Key Infrastructure (PKI) framework
- Overview of TLS and SSL protocol
- Use cases for TLS
Participants are advised to bring their own laptop computers with high-speed Wi-Fi (802.11a/g/n/ac) and administrative access to system. It is also recommended that laptops have Intel i5 or i7 processor, >=8GB of RAM and 30GB of free hard disk space.
Software: SSH Client, Telnet Client, VirtualBox/VMware
Confirm Secure SHell (SSH) is allowed from the office or home network to access the lab infrastructure? Test ssh connectivity, try to connect to route-views.oregon-ix.net.
For example from the CLI type: ssh email@example.com