Public Key Infrastructure and Certificate Distribution
Cybersecurity
| Beginner
- 17 videos | 53m 16s
- Includes Assessment
- Earns a Badge
Public-key infrastructure (PKI) is the framework of encryption and cybersecurity used to safely distribute, verify and revoke certificates in an organization and manage public-key encryption. In this course, you will learn the fundamentals of PKI and explore considerations when implementing trust structures through technology and public key-based digital certificates. Explore PKI components including certification authorities, certificates, revocation lists, registration authorities, entities and certificate templates, and discover how certificate authorities (CA) are used to issue certificates to entities and manage trust relationships. Discover how to differentiate between root and subordinate CAs as well as internal and external PKIs, and explore public key certificates and how they can represent the digital identity of the subject. Lastly, explore common certificate acquisition methods including web, auto-enrollment, MMCs, and native consoles, and explore use cases for common access cards (CAC). This course was originally created by Global Knowledge (GK).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDiscuss considerations when implementing trust structures through technology and public key based digital certificatesDescribe public key infrastructure (pki) and list its objectives and core principlesList pki components including certification authorities, certificates, revocation lists, registration authorities, entities and certificate templatesDiscuss how certificate authorities (ca) are used to issue certificates to entities and manage trust relationshipsDifferentiate between root and subordinate casDifferentiate between internal and external pkisRecognize how to organize cas in an organizationDescribe how exchanging public keys can enable trust
-
Provide an overview of public key certificates and how they can represent the digital identity of subjectList common certificate usages including efs, web servers, ipsec, kerberos, and code signingList common certificate acquisition methods including web, auto-enrollment, mmcs, and native consolesRecognize key considerations of certification management including expiration and revocationDescribe how certificate revocation lists workList considerations and options for storing keys and certificatesProvide an overview of common access cards (cac)Recognize possible ca management concerns such as ca administration, dividing certificates, policies for backups, and procedures for certificate approval
IN THIS COURSE
-
1m 1s
-
44s
-
1m 35s
-
3m 17s
-
2m 18s
-
3m 58s
-
3m 42s
-
3m 41s
-
1m 49s
-
1m 51s
-
4m 28s
-
2m 35s
-
4m 22s
-
4m 29s
-
3m 46s
-
2m 51s
-
6m 51s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.