In this chapter, we learned about the features that HTTPS provides over HTTP, such as authentication and encryption. We saw that HTTPS is really just HTTP over a TLS connection and that TLS can be applied to any TCP connection.
We also learned about basic encryption concepts. We saw how asymmetric ciphers use two keys, and how this allows for digital signatures. The very basics of certificates were covered, and we explored some of the difficulties with verifying them.
Finally, we worked through a concrete example that established a TLS connection to an HTTPS server.
This chapter was all about HTTPS clients, but in the next chapter, we focus on how HTTPS servers work.