Summary
In this chapter, we saw how a PKI provides trust while communicating on a network and allows us to securely exchange keys during a data transaction. We saw that a PKI is not a single protocol but a framework comprised of several different components, which include the algorithms, keys, and CAs. In addition, we covered where we store certificates on our own systems and learned what happens when a certificate is no longer valid.
We then took a look at the process of obtaining a digital certificate from a CA. We also discussed ways a malicious actor can intercept and spoof a certificate, and then outlined how pinning a certificate can help prevent spoofing. Finally, we defined trusted root and self-signed certificates and saw the steps to take to create a code-signing certificate on a Windows machine. We then covered what's involved in the X.509 standard, which defines the format of public key certificates. Finally, we saw the different ways a certificate can be validated...