Masterclass Public Key Infrastructure Management [PKI]

Durée totale
Date et lieu de début
Logo Global Knowledge Belgium BVBA
Note du fournisseur: starstarstarstarstar_border 8 Global Knowledge Belgium BVBA a une moyenne de 8 (basée sur 1 avis)

Astuce: besoin de plus d'informations sur la formation? Téléchargez la brochure!

Dates et lieux de début

Mechelen (Zandvoortstraat 1)
2 déc. 2019 jusqu'au 6 déc. 2019
Mechelen (Zandvoortstraat 1)
13 jan. 2020 jusqu'au 17 jan. 2020
Mechelen (Zandvoortstraat 1)
2 mar. 2020 jusqu'au 6 mar. 2020
Mechelen (Zandvoortstraat 1)
11 mai 2020 jusqu'au 15 mai 2020
Mechelen (Zandvoortstraat 1)
22 juin 2020 jusqu'au 26 juin 2020

Description

OVERVIEW

Deze Masterclass Public Key Infrastructure Management, PKI, is ontwikkeld door CQURE en richt zich op Microsoft technologie. Leer de details van PKI kennen, best practices en meest voorkomende scenario's van het gebruik van certificaten.

OBJECTIVES

This 5-day course is considered essential for anyone who would like to expand knowledge about Public Key Infrastructure (PKI) in Microsoft technologies. During the course PKI is covered in depth, starting from the best practices for implementing secure and reliable PKI and ending up with most common scenarios of certificates usage in the enterprise environment.

At the end of the course you will be able to:

? Understand the core essence of…

Lisez la description complète ici

Foire aux questions (FAQ)

There are no frequently asked questions yet.  

Vous n'avez pas trouvé ce que vous cherchiez ? Voir aussi : Serveurs Windows, Développeur / Developer, Amazon Web Services (AWS), Administration des serveurs et Serveur Lync.

OVERVIEW

Deze Masterclass Public Key Infrastructure Management, PKI, is ontwikkeld door CQURE en richt zich op Microsoft technologie. Leer de details van PKI kennen, best practices en meest voorkomende scenario's van het gebruik van certificaten.

OBJECTIVES

This 5-day course is considered essential for anyone who would like to expand knowledge about Public Key Infrastructure (PKI) in Microsoft technologies. During the course PKI is covered in depth, starting from the best practices for implementing secure and reliable PKI and ending up with most common scenarios of certificates usage in the enterprise environment.

At the end of the course you will be able to:

? Understand the core essence of PKI and cryptography.

? Evaluate and select appropriate PKI technologies.

? Install and configure PKI environments according to the best practices taken from practical experience.

? Secure existing PKI infrastructure.

? Choose appropriate types and manage the certificate lifecycle.

? Understand the benefits of certificates used in the infrastructure.

? Adjust PKI to your business needs.

? Become familiar with enterprise solutions that uses PKI and certificates for security.

? Configure and use certificates in: IIS, VPN, Wi-Fi, file encryption, e-mail security and many more.

All exercises are based on newest Windows Server 2016, Windows 10 with additional Linux and virtual network appliances that covers common scenarios.

AUDIENCE

Network administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security, Chief Security Officers.

CONTENT

Module 1: Essence of PKI
This module introduces cryptography basics and fundamentals of public key infrastructure with detailed information about certificates.
a. Cryptography basics
b. Fundamentals of PKI
c. Certificate types (X.509)
d. Certification authorities
e. Certificate Revocation Lists


Module 2: Designing and implementing CA Hierarchy
Module 2 covers one of the most important topics for successful and secure deployment of PKI in enterprise environment.
a. Planning
b. Preparing AD Environment
c. Implementing CA Hierarchy
d. Securing CA Hierarchy
e. Role separation
f. Security Policy

Module 3: PKI in Windows domain
In this module, you will become familiar with important aspects of implementing PKI in Windows Server 2016 environment.
a. Managing PKI
b. Configuring Certificate Templates
c. Configuring Certificate Enrollment
d. Configuring Key Archival and Recovery
e. Configuring Trust Between Organizations

Module 4: Upgrading PKI Infrastructure
This module focuses on supported scenarios and challenges regarding migration and upgrade of existing infrastructure.
a. Supported scenarios
b. Upgrading certificate templates
c. Migration scenarios

Module 5: PKI Security
This module reviews all aspects of security of PKI and certificates. We also cover physical security and usage of smartcards, TPM and HSM.
a. Deploying certificates to Domain Controllers
b. Certificate Revocation
c. Certificate Validation
d. CDP, AIA and OCSP
e. Planning and implementing disaster recovery
f. Deploying Smart Cards
g. TPM Virtual Smartcard
h. Private key security with HSM

Module 6: Securing applications with PKI
This module focuses on day-to-day operation and challenges in securing applications with certificates.
a. Secure IIS Traffic with SSL
b. IIS certificate store security
c. IIS users authentication
d. Windows logon with Smart Cards
e. E-mail security
f. Encrypting file system
g. Document and code signing

Module 7: PKI for network security
Last module covers how to use to PKI to increase network security.
a. VPN
b. Wireless Networking
c. 802.1X and NPS
d. Radius server
e. IPsec
f. Mobile devices certificates with MDM, SCEP and NDES

Rester à jour sur les nouveaux avi

Pas encore d'avis.

Partagez vos avis

Avez-vous participé à cours? Partagez votre expérience et aider d'autres personnes à faire le bon choix. Pour vous remercier, nous donnerons 1,00 € à la fondation Stichting Edukans.

There are no frequently asked questions yet.  

Recevoir une brochure d'information (gratuit)

Sexe:
(optionnel)
(optionnel)
(optionnel)
(optionnel)
infoThe provider Global Knowledge Belgium BVBA requires your phone number to process your information request. (optionnel)
(optionnel)
(optionnel)

Vous avez des questions?

(optionnel)
Nous conservons vos données personnelles dans le but de vous accompagner par email ou téléphone. Vous pouvez trouver plus d'informations sur : Politique de confidentialité.