Perfect Forward Secrecy

Perfect Forward Secrecy

Learn all about PFS and ExtraHop's non-invasive method of ensuring complete visibility.

rate limit

Code not recognized.

About this course

By the end of this module, you will be able to:
1) Define perfect forward secrecy
2) Describe each of the five major key exchange algorithms
3) Identify which key exchange algorithms result in perfect forward secrecy

Course Contents6 min

  • Perfect Forward Secrecy

    Perfect Forward Secrecy video

  • Perfect Forward Secrecy Video 6 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Perfect Forward Secrecy Quiz

    Perfect Forward Secrecy knowledge check quiz

  • Perfect Forward Secrecy Quiz

About this course

By the end of this module, you will be able to:
1) Define perfect forward secrecy
2) Describe each of the five major key exchange algorithms
3) Identify which key exchange algorithms result in perfect forward secrecy

Course Contents6 min

  • Perfect Forward Secrecy

    Perfect Forward Secrecy video

  • Perfect Forward Secrecy Video 6 min
  • Additional Resources

    Links to ExtraHop Documentation and/or relevant articles

  • Additional Resources
  • Perfect Forward Secrecy Quiz

    Perfect Forward Secrecy knowledge check quiz

  • Perfect Forward Secrecy Quiz