PKI Explained: Securing Web Communication π
Learn how Public Key Infrastructure (PKI) secures browser-server communication in this detailed overview. Part of Bare Metal Cloud Security Series.

Heavy Metal Cloud
1.1K views β’ Nov 4, 2025

About this video
This video dives deep into the world of Public Key Infrastructure (PKI), explaining how it secures communication between your browser and a web server.
We start with the basics of setting up a website and quickly move to the issue of hacker interception and the need for secure communication.
What you will learn:
- The difference between a public key (for encryption) and a private key (for decryption).
- How asymmetric encryption and a symmetric key work together to secure a session efficiently.
- What a man-in-the-middle attack is and how a Certificate Authority (CA) prevents it.
- The purpose of a Trust Store and why operating systems trust certain CAs.
- The Chain of Trust flow: Root Certificate, Intermediate Certificate, and Leaf Certificate.
- The use of Subject Alternative Name (SAN) and wildcard certs for domain protection.
If you are setting up a secure website or want to understand foundational internet security, this video is for you!
0:00:00 - Intro
0:01:04 - Switching from Asymmetric to Symmetric Encryption
0:01:54 - Man-in-the-Middle Attacks
0:02:58 - The Trust Store
0:03:41 - The Chain of Trust
0:04:47 - Subject Alternative Names (SAN)
Amazon Affiliate Links - My recording Studio:
- Cameras
https://amzn.to/4msYu7v
https://amzn.to/3JtfThX
- Lenses
https://amzn.to/4oOsrQX
https://amzn.to/41iodr0
- Audio
https://amzn.to/48PkdTb
https://amzn.to/463UWmp
https://amzn.to/4lDJ7bb
- Lighting
https://amzn.to/3HRiB09
https://amzn.to/4lMxxe2
https://amzn.to/3VdqgZM
https://amzn.to/4mZ10T4
- Tripods, etc.
https://amzn.to/3Jo6isO
https://amzn.to/3Jsu1bj
https://amzn.to/3JyvQDn
https://amzn.to/4mQQJbk
https://amzn.to/41lFMXb
We start with the basics of setting up a website and quickly move to the issue of hacker interception and the need for secure communication.
What you will learn:
- The difference between a public key (for encryption) and a private key (for decryption).
- How asymmetric encryption and a symmetric key work together to secure a session efficiently.
- What a man-in-the-middle attack is and how a Certificate Authority (CA) prevents it.
- The purpose of a Trust Store and why operating systems trust certain CAs.
- The Chain of Trust flow: Root Certificate, Intermediate Certificate, and Leaf Certificate.
- The use of Subject Alternative Name (SAN) and wildcard certs for domain protection.
If you are setting up a secure website or want to understand foundational internet security, this video is for you!
0:00:00 - Intro
0:01:04 - Switching from Asymmetric to Symmetric Encryption
0:01:54 - Man-in-the-Middle Attacks
0:02:58 - The Trust Store
0:03:41 - The Chain of Trust
0:04:47 - Subject Alternative Names (SAN)
Amazon Affiliate Links - My recording Studio:
- Cameras
https://amzn.to/4msYu7v
https://amzn.to/3JtfThX
- Lenses
https://amzn.to/4oOsrQX
https://amzn.to/41iodr0
- Audio
https://amzn.to/48PkdTb
https://amzn.to/463UWmp
https://amzn.to/4lDJ7bb
- Lighting
https://amzn.to/3HRiB09
https://amzn.to/4lMxxe2
https://amzn.to/3VdqgZM
https://amzn.to/4mZ10T4
- Tripods, etc.
https://amzn.to/3Jo6isO
https://amzn.to/3Jsu1bj
https://amzn.to/3JyvQDn
https://amzn.to/4mQQJbk
https://amzn.to/41lFMXb
Video Information
Views
1.1K
Likes
62
Duration
5:33
Published
Nov 4, 2025
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.