Intermediate Path
Deepen your knowledge with practical applications and best practices
Prerequisites
Security Modules
Master Keys vs. Subkeys
Understanding key architecture and separation of concerns
YubiKey Hardware Setup
Configure hardware security with YubiKey for maximum protection
YubiKey Public Key Management: The Missing Link
Learn the often overlooked critical step in YubiKey setup: properly handling your public keys across devices
YubiKey Bio Setup
Configure YubiKey Bio for system login and authentication across platforms
YubiKey OpenPGP Recovery and Reset
Learn how to recover from PIN lockouts, reset the OpenPGP application, and reimport keys
YubiKey Troubleshooting Guide
Comprehensive solutions for common YubiKey issues, connectivity problems, and application integration challenges
Multi-Factor Authentication Strategies
Implementing and managing robust multi-factor authentication systems
Passwordless Authentication: The Future of Access
Explore the rise of passwordless authentication methods, their benefits, challenges, and implementation strategies
SSH Keys: Why You Should Never Use Passwords for Servers
Learn why SSH keys are vastly superior to passwords for server authentication
What Are SSH Certificates?
Move beyond SSH keys to certificate-based authentication for enterprise scale
Key Management Best Practices
Effective strategies for key storage, expiration, and renewal
Cross-Platform Key Management
Maintain consistent key access across your devices and operating systems
Daily Secure Workflows
Develop practical routines that maintain security without sacrificing usability
Complete Your Intermediate Path
Finish all modules to receive your completion badge and unlock advanced content.
After completing these modules, move on to the Advanced Path for more expert-level topics.
Related Content
Day in the Life: Security Professional
See how a security expert implements encryption in their daily workflow
Introduction to PGP Encryption
Understand the basics of PGP encryption and why it matters
Advanced Topics
Ready for the most challenging encryption concepts? Check out our advanced path when you complete the intermediate modules.
Advanced pathEncryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.
— Edward Snowden