Public Key Infrastructure and Certificate Distribution

Cybersecurity    |    Beginner
  • 17 videos | 53m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.2 of 74 users Rating 4.2 of 74 users (74)
Public-key infrastructure (PKI) is the framework of encryption and cybersecurity used to safely distribute, verify and revoke certificates in an organization and manage public-key encryption. In this course, you will learn the fundamentals of PKI and explore considerations when implementing trust structures through technology and public key-based digital certificates. Explore PKI components including certification authorities, certificates, revocation lists, registration authorities, entities and certificate templates, and discover how certificate authorities (CA) are used to issue certificates to entities and manage trust relationships. Discover how to differentiate between root and subordinate CAs as well as internal and external PKIs, and explore public key certificates and how they can represent the digital identity of the subject. Lastly, explore common certificate acquisition methods including web, auto-enrollment, MMCs, and native consoles, and explore use cases for common access cards (CAC). This course was originally created by Global Knowledge (GK).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Discuss considerations when implementing trust structures through technology and public key based digital certificates
    Describe public key infrastructure (pki) and list its objectives and core principles
    List pki components including certification authorities, certificates, revocation lists, registration authorities, entities and certificate templates
    Discuss how certificate authorities (ca) are used to issue certificates to entities and manage trust relationships
    Differentiate between root and subordinate cas
    Differentiate between internal and external pkis
    Recognize how to organize cas in an organization
    Describe how exchanging public keys can enable trust
  • Provide an overview of public key certificates and how they can represent the digital identity of subject
    List common certificate usages including efs, web servers, ipsec, kerberos, and code signing
    List common certificate acquisition methods including web, auto-enrollment, mmcs, and native consoles
    Recognize key considerations of certification management including expiration and revocation
    Describe how certificate revocation lists work
    List considerations and options for storing keys and certificates
    Provide an overview of common access cards (cac)
    Recognize possible ca management concerns such as ca administration, dividing certificates, policies for backups, and procedures for certificate approval

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 42 users Rating 4.5 of 42 users (42)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.6 of 164 users Rating 4.6 of 164 users (164)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 70 users Rating 4.5 of 70 users (70)
Rating 4.7 of 220 users Rating 4.7 of 220 users (220)
Rating 4.6 of 129 users Rating 4.6 of 129 users (129)