Cryptography: Learn Public Key Infrastructure from Scratch
- Offered byUDEMY
Cryptography: Learn Public Key Infrastructure from Scratch at UDEMY Overview
Duration | 35 hours |
Mode of learning | Online |
Difficulty level | Intermediate |
Credential | Certificate |
Future job roles | Foreign currency, Technical Consultant , Business Communication, Grammar, Senior Software Developer |
Cryptography: Learn Public Key Infrastructure from Scratch at UDEMY Highlights
- 33.5 hours on-demand video
- 111 articles
- 26 downloadable resources
- Access on mobile and TV
- Certificate of Completion
- Full lifetime access
Cryptography: Learn Public Key Infrastructure from Scratch at UDEMY Course details
- Course is designed for audience of all types from beginner to expert, so no prior knowledge of PKI is required
- Students who are working as an IT professionals and want to learn about Active directory Certificate Services a.k.a ADCS on Windows Infra
- Students who are in Cyber security or Identity and Access Management space
- Learn to Install, Configure and Manage 2-tier PKI hierarchy on Windows Server 2012 R2
- Learn to Configure CDP/CIA extensions, OCSP server
- Learn to Understand how encryption/decryption works together
- Learn How standalone machines or devices request certificates using NDES, CEP/CES
- Learn How to Migrate Hashing Algorithm from SHA1 to SHA2 (SHA256) on two tier PKI hierarchy
- In this course we'll talk about PKI which means Public Key Infrastructure. This course provides students with the knowledge and skills to deploy and manage a 2-tier public key infrastructure (PKI) on windows servers to support applications that require certificate based security. Students get hands-on experience implementing the solution to secure websites, applications and devices.
Cryptography: Learn Public Key Infrastructure from Scratch at UDEMY Curriculum
Introduction
Course Overview and Know your Instructor
Overview of Public Key Infrastructure
What is PKI
Uses of PKI
Components of PKI Solution
What is a digital Certificate
Overview of Cryptography
What Cryptography is all about
Symmetric and Asymmetric Encryption
What is Digital Signing
Encryption Algorithms
Hashing Algorithms
Certification Authority or CA
Overview of CA
Public Vs Private CA
Root and Subordinate CAs
Stand-Alone vs Enterprise CAs
Consideration for Implementing CA Hierarchy - Root and Subordinates
Hands-On Installing a Standalone Root CA
Hands-On Installing an Enterprise Subordinate CA
Certificate Request or Enrollment Methods
Certificate Request or Enrollment ' Intro
Certificate Templates
Types of Certificate Enrollment
Hands-On Requesting a Certificate using web Enrollment
Hands-On Requesting a certificate using MMC
Hands-On Requesting a certificate using Auto-enrollment
Hands-On Requesting a certificate offline
Hands-On Securing a website using certificate
Hands-On Encrypting and Decrypting a File with Certificate
Configuring CA Properties
Configuring CA Administration and Security
Configuring CA Policy and Exit Modules
Understanding CRLs, AIA and CDP Extensions
Configuring AIA and CDP Extension
New Roles in Certificate Services
New Roles in Certificate Services ' Intro
Network Device Enrollment Service (NDES)
Configuring NDES - Part 1
Configuring NDES - Part 2
Understanding CEP and CES a.k.a. Enrollment Agents
Configuring CEP and CES
Online Responder a.k.a. OCSP
Configuring an Online Responder or OCSP
Bonus: Migrating Hashing Algorithm from SHA1 to SHA2 on Windows Server 2016 CA
Installing Root CA on Windows Server 2016
Installing Subordinate CA on Windows Server 2016
Planning Before Migrating Hashing Algorithm from SHA1 to SHA2
Migrating Hashing Algorithm from SHA1 to SHA2 on RootCA
Migrating Hashing Algorithm from SHA1 to SHA2 on Subordinate CA
Other courses offered by UDEMY
Cryptography: Learn Public Key Infrastructure from Scratch at UDEMY Students Ratings & Reviews
- 4-51