Back to Academy
Intermediate 300 min available 13/13 modules published

Intermediate Path

Deepen your knowledge with practical applications and best practices

Prerequisites

Beginner's Path

Complete the beginner modules first to understand the fundamentals

View path

Security Modules

Module 1

Master Keys vs. Subkeys

Understanding key architecture and separation of concerns

Skills covered 20 minutes
Key architecture Offline master keys Subkey management
Start module
Module 2

YubiKey Hardware Setup

Configure hardware security with YubiKey for maximum protection

Skills covered 25 minutes
Hardware tokens Key transfers Touch policies
Start module
Module 3

YubiKey Public Key Management: The Missing Link

Learn the often overlooked critical step in YubiKey setup: properly handling your public keys across devices

Skills covered 20 minutes
YubiKey setup Public key handling Troubleshooting
Start module
Module 4

YubiKey Bio Setup

Configure YubiKey Bio for system login and authentication across platforms

Skills covered 30 minutes
Biometric security System authentication OS integration
Start module
Module 5

YubiKey OpenPGP Recovery and Reset

Learn how to recover from PIN lockouts, reset the OpenPGP application, and reimport keys

Skills covered 30 minutes
Key recovery Hardware reset PIN management
Start module
Module 6

YubiKey Troubleshooting Guide

Comprehensive solutions for common YubiKey issues, connectivity problems, and application integration challenges

Skills covered 25 minutes
Problem diagnosis Error resolution YubiKey management
Start module
Module 7

Multi-Factor Authentication Strategies

Implementing and managing robust multi-factor authentication systems

Skills covered 25 minutes
TOTP setup U2F protocols Implementation strategies
Start module
Module 8

Passwordless Authentication: The Future of Access

Explore the rise of passwordless authentication methods, their benefits, challenges, and implementation strategies

Skills covered 25 minutes
FIDO2/WebAuthn Biometrics Decentralized identity
Start module
Module 9

SSH Keys: Why You Should Never Use Passwords for Servers

Learn why SSH keys are vastly superior to passwords for server authentication

Skills covered 20 minutes
Server security Key-based authentication Attack prevention
Start module
Module 10

What Are SSH Certificates?

Move beyond SSH keys to certificate-based authentication for enterprise scale

Skills covered 25 minutes
Certificate authorities Trust chains Just-in-time access
Start module
Module 11

Key Management Best Practices

Effective strategies for key storage, expiration, and renewal

Skills covered 20 minutes
Key rotation Expiration policies Backup strategies
Start module
Module 12

Cross-Platform Key Management

Maintain consistent key access across your devices and operating systems

Skills covered 20 minutes
Platform compatibility Synchronization Mobile security
Start module
Module 13

Daily Secure Workflows

Develop practical routines that maintain security without sacrificing usability

Skills covered 15 minutes
Security habits Convenience vs. security Environment isolation
Start module

Complete Your Intermediate Path

Finish all modules to receive your completion badge and unlock advanced content.

After completing these modules, move on to the Advanced Path for more expert-level topics.

Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.

— Edward Snowden