Public Key Infrastructure and Certificate Distribution

Cybersecurity    |    Beginner
  • 17 Videos | 55m 46s
  • Includes Assessment
  • Earns a Badge
Public-key infrastructure (PKI) is the framework of encryption and cybersecurity used to safely distribute, verify and revoke certificates in an organization and manage public-key encryption. In this course, you will learn the fundamentals of PKI and explore considerations when implementing trust structures through technology and public key-based digital certificates. Explore PKI components including certification authorities, certificates, revocation lists, registration authorities, entities and certificate templates, and discover how certificate authorities (CA) are used to issue certificates to entities and manage trust relationships. Discover how to differentiate between root and subordinate CAs as well as internal and external PKIs, and explore public key certificates and how they can represent the digital identity of the subject. Lastly, explore common certificate acquisition methods including web, auto-enrollment, MMCs, and native consoles, and explore use cases for common access cards (CAC).

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    discuss considerations when implementing trust structures through technology and public key based digital certificates
    describe public key infrastructure (PKI) and list its objectives and core principles
    list PKI components including certification authorities, certificates, revocation lists, registration authorities, entities and certificate templates
    discuss how certificate authorities (CA) are used to issue certificates to entities and manage trust relationships
    differentiate between root and subordinate CAs
    differentiate between internal and external PKIs
    recognize how to organize CAs in an organization
    describe how exchanging public keys can enable trust
  • provide an overview of public key certificates and how they can represent the digital identity of subject
    list common certificate usages including EFS, web servers, IPsec, Kerberos, and code signing
    list common certificate acquisition methods including web, auto-enrollment, MMCs, and native consoles
    recognize key considerations of certification management including expiration and revocation
    describe how certificate revocation lists work
    list considerations and options for storing keys and certificates
    provide an overview of common access cards (CAC)
    recognize possible CA management concerns such as CA administration, dividing certificates, policies for backups, and procedures for certificate approval

IN THIS COURSE

  • Playable
    1. 
    Introduction to Public Key Infrastructure
    1m 1s
    UP NEXT
  • Playable
    2. 
    Trust Structures
    44s
  • Locked
    3. 
    Public Key Infrastructure
    1m 35s
  • Locked
    4. 
    Public Key Infrastructure Components
    3m 17s
  • Locked
    5. 
    Certification Authorities
    2m 18s
  • Locked
    6. 
    Root and subordinate CAs
    3m 58s
  • Locked
    7. 
    Internal vs. External PKIs
    3m 42s
  • Locked
    8. 
    CA Structure Comparison
    3m 41s
  • Locked
    9. 
    Considerations when Enabling Trust
    1m 49s
  • Locked
    10. 
    Public Key Certificates
    1m 51s
  • Locked
    11. 
    Certificate Use Cases
    4m 28s
  • Locked
    12. 
    Certificate Distribution
    2m 35s
  • Locked
    13. 
    Certificate Expiration and Revocation
    4m 22s
  • Locked
    14. 
    Certificate Revocation List
    4m 29s
  • Locked
    15. 
    Certificate Storage
    3m 46s
  • Locked
    16. 
    Common Access Cards
    2m 51s
  • Locked
    17. 
    Certificate Authority Management
    6m 51s