Security: Handling keys, certificates and PEM files

This tutorial is only in planning at this point. Follow me on Twitter to get notified as soon as it is published.