What about this course?
Understanding and implementing a secure infrastructure is a key skill for any security engineer, and PKI is a core component of any secure environment. In this course, you'll take a look at a brief history of encryption and the various algorithms involved. You'll also learn about how a PKI environment functions, from the time a certificate is requested through expiration or revocation. In addition, you'll learn how to install and configure CAs, how the trust between them functions, and how to properly maintain and secure the environment.

Instructor for this course
Brian Olliff
Defensive Cyber Security
This course is composed by the following modules
Course Introduction
Introduction to Encryption
Hashing & Encryption
The Problem with Public Keys
PKI in Real Life
Components of a PKI System
CSRs in PKI
CSR Lab
PKI - CSR Creation
PKI Functionality
Creating a Public Key Infrastructure
PKI in Active Directory
Configuring PKI in AD
Linux PKI
Configuring PKI in Linux
Troubleshooting & Maintaining PKI
Protecting PKI
Course Conclusion
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?