What about this course?
Understanding and implementing a secure infrastructure is a key skill for any security engineer, and PKI is a core component of any secure environment. In this course, you'll take a look at a brief history of encryption and the various algorithms involved. You'll also learn about how a PKI environment functions, from the time a certificate is requested all the way through expiration or revokation. In additional, you'll learn how to install and configure CAs, how the trust between them functions, and how to properly maintain and secure the environment.
Instructor for this course
Defensive Cyber Security
This course is composed by the following modules
Introduction to Encryption
Hashing & Encryption
The Problem with Public Keys
PKI in Real Life
Components of a PKI System
CSRs in PKI
PKI - CSR Creation
Creating a Public Key Infrastructure
PKI in Active Directory
Configuring PKI in AD
Configuring PKI in Linux
Troubleshooting & Maintaining PKI
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?
Are the training videos downloadable?
I only want to purchase access to one training course, not all of them, is this possible?
Are there any fees or penalties if I want to cancel my subscription?