Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Defending EV Charging From Hackers
Module 2: Defending EV Charging From Hackers
1. Introduction to the TLS Handshake (8:33)
2. TLS Handshake, Part 1: Cipher Suites and OCSP Multi-Stapling (17:10)
3. TLS Handshake, Part 2: Switching to Encrypted Communication (9:44)
4. Truststores and Keystores - Managing Keys and Certificates in Java (7:43)
5. Hands-on Session: TLS Client and Server in RISE V2G (16:54)
6. Provisioning a Contract Certificate, Part 1: Certificate Installation Request (14:19)
7. Provisioning a Contract Certificate, Part 2: Certificate Installation Response (10:55)
8. Payment Details Request: How an EV Authorizes for Charging (13:39)
7. Provisioning a Contract Certificate, Part 2: Certificate Installation Response
Lesson contents locked
If you're already enrolled,
you'll need to login
.
Join Course to Unlock