Learn how to configure, extend, and troubleshoot secure TLS applications with wolfSSL.
Following Part 1 of our Getting Started with wolfSSL webinar series, Part 2 dives deeper into the topics developers encounter once basic TLS integration is complete. This session focuses on configuration, embedded deployment, and advanced TLS features used in real-world systems.
Led by wolfSSL Engineering Manager Chris Conlon, Part 2 builds on the foundational concepts introduced in Part 1 and explores how wolfSSL is adapted, optimized, and deployed across desktop and embedded environments.
Register Now: Getting Started with wolfSSL – Two-Part Webinar Series
Date and Time
Part 1: January 7 | 9 AM PT
Part 2: January 14 | 9 AM PT
What Is wolfSSL?
wolfSSL is a lightweight, high-performance embedded SSL/TLS library designed for security-critical and resource-constrained systems. It supports modern protocols such as TLS 1.3 and DTLS 1.3, offers an OpenSSL compatibility layer, integrates with hardware cryptography, and provides certifications including FIPS 140-3.
wolfSSL is widely used across embedded, IoT, industrial, automotive, and high-assurance environments where security, portability, and performance matter.
What You’ll See in Part 1 (January 7)
Part 1 establishes the foundation for working with wolfSSL, covering:
- wolfSSL package structure and layout
- Building wolfSSL on common platforms
- Verifying builds with tests and benchmarks
- Core API concepts
- Creating a basic TLS client and server
- Debug logging and troubleshooting
This session ensures attendees understand how wolfSSL is built, tested, and used at a fundamental level.
What You’ll See in Part 2 (January 14)
Part 2 shifts focus to configuration, embedded use cases, and advanced TLS workflows, including:
- Certificate management and configuration options
- Porting wolfSSL to embedded systems
- OpenSSL compatibility layer overview
- DTLS, PSK, and session resumption
- Debugging techniques and common pitfalls
This session is ideal for developers who want to move beyond basic TLS setup and understand how wolfSSL behaves in production, constrained, and embedded environments.
Register now to join Part 2—and gain deeper insight into configuring, deploying, and debugging wolfSSL in real-world systems.
As always, our webinar will include Q&A throughout. If you have questions about any of the above, please contact us at facts@wolfssl.com or call us at +1 425 245 8247.
Download wolfSSL Now

