HOME > IT & Software > Cryptography- Learn Public Key Infrastructure from Scratch

Cryptography- Learn Public Key Infrastructure from Scratch

SynopsisCryptography: Learn Public Key Infrastructure from Scratch, a...
Cryptography- Learn Public Key Infrastructure from Scratch  No.1

Cryptography: Learn Public Key Infrastructure from Scratch, available at $64.99, has an average rating of 4.4, with 44 lectures, based on 1542 reviews, and has 8461 subscribers.

You will learn about Install, Configure and Manage 2-tier PKI hierarchy on Windows Server 2012 R2 Will have in-depth understanding of configuring certification services on Microsoft environment How SSL are used to Secure website using certificates How standalone machines or devices request certificates using NDES, CEP/CES Configure CDP/CIA extensions, OCSP server Understand how encryption/decryption works together How to Migrate Hashing Algorithm from SHA1 to SHA2 (SHA256) on two tier PKI hierarchy This course is ideal for individuals who are This Course is designed for audience of all types from beginner to expert, so no prior knowledge of PKI is required or Students who are working as an IT professionals and want to learn about Active directory Certificate Services a.k.a ADCS on Windows Infra or Students who are in Cyber security or Identity and Access Management space It is particularly useful for This Course is designed for audience of all types from beginner to expert, so no prior knowledge of PKI is required or Students who are working as an IT professionals and want to learn about Active directory Certificate Services a.k.a ADCS on Windows Infra or Students who are in Cyber security or Identity and Access Management space.

Enroll now: Cryptography: Learn Public Key Infrastructure from Scratch

Summary

Title: Cryptography: Learn Public Key Infrastructure from Scratch

Price: $64.99

Average Rating: 4.4

Number of Lectures: 44

Number of Published Lectures: 44

Number of Curriculum Items: 44

Number of Published Curriculum Objects: 44

Original Price: $22.99

Quality Status: approved

Status: Live

What You Will Learn

  • Install, Configure and Manage 2-tier PKI hierarchy on Windows Server 2012 R2
  • Will have in-depth understanding of configuring certification services on Microsoft environment
  • How SSL are used to Secure website using certificates
  • How standalone machines or devices request certificates using NDES, CEP/CES
  • Configure CDP/CIA extensions, OCSP server
  • Understand how encryption/decryption works together
  • How to Migrate Hashing Algorithm from SHA1 to SHA2 (SHA256) on two tier PKI hierarchy
  • Who Should Attend

  • This Course is designed for audience of all types from beginner to expert, so no prior knowledge of PKI is required
  • Students who are working as an IT professionals and want to learn about Active directory Certificate Services a.k.a ADCS on Windows Infra
  • Students who are in Cyber security or Identity and Access Management space
  • Target Audiences

  • This Course is designed for audience of all types from beginner to expert, so no prior knowledge of PKI is required
  • Students who are working as an IT professionals and want to learn about Active directory Certificate Services a.k.a ADCS on Windows Infra
  • Students who are in Cyber security or Identity and Access Management space
  • What is this course about?

    Do you wonder how SSL works on websites? And what is the significance of digital certificates in secure communication between two entities e.g. a client and a web server? Then you are in the right place.

    In this course, we’ll talk about PKI which means Public Key Infrastructure. This course provides students with the knowledge and skills to deploy and manage a 2-tier public key infrastructure (PKI) on windows servers to support applications that require certificate based security. Students get hands-on experience implementing the solution to secure websites, applications and devices.

    Note: “This course is purely related to Microsoft PKI on windows server a.k.a. Active Directory Certificate Services (ADCS), Please go through the curriculum thoroughly before purchasing the course” 

    What kind of materials are used? 

    I’ve designed this course using Microsoft Official Curriculum (MOC). Training will be done through videos where you’ll find lectures and hands-on. 

    Why take this Course?

    There are many reasons to take this course. 

    1. One of the Best courses with more than a 4-star rating on this topic.

    2. This course is designed according to Microsoft Official Curriculum and taught by Microsoft Certified Trainer.

    3. Knowing the understanding level of students whether they are a beginner or advanced, this course is designed for all levels making it the best fit for everyone.

    4. You’ll find lots of Hands-On in this course which will make you practically sound.

    5. And moreover, security is a hot subject in today’s digital age, so why not learn about one of the major and most popular technique to secure your IT Infrastructure.

    6. At last, I am eager to see you succeed, I am offering you my help, assistance wherever required in learning this course. You can drop your queries in the Q&A section of the course and I’ll make sure it will be responded promptly.

    30/11/2018

    Course updated: Included Lectures on Migrating Hashing Algorithm from SHA1 to SHA2

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Course Overview and Know your Instructor

    Chapter 2: Overview of Public Key Infrastructure

    Lecture 1: What is PKI

    Lecture 2: Uses of PKI

    Lecture 3: Components of PKI Solution

    Lecture 4: What is a digital Certificate

    Chapter 3: Overview of Cryptography

    Lecture 1: What Cryptography is all about

    Lecture 2: Symmetric and Asymmetric Encryption

    Lecture 3: What is Digital Signing

    Lecture 4: Encryption Algorithms

    Lecture 5: Hashing Algorithms

    Chapter 4: Certification Authority or CA

    Lecture 1: overview of CA

    Lecture 2: Public Vs Private CA

    Lecture 3: Root and Subordinate CAs

    Lecture 4: Stand-Alone vs Enterprise CAs

    Lecture 5: Consideration for Implementing CA Hierarchy – Root and Subordinates

    Lecture 6: Hands-On Installing a Standalone Root CA

    Lecture 7: Hands-On Installing an Enterprise Subordinate CA

    Chapter 5: Certificate Request or Enrollment Methods

    Lecture 1: Certificate Request or Enrollment – Intro

    Lecture 2: Certificate Templates

    Lecture 3: Types of Certificate Enrollment

    Lecture 4: Hands-On Requesting a Certificate using web Enrollment

    Lecture 5: Hands-On Requesting a certificate using MMC

    Lecture 6: Hands-On Requesting a certificate using Auto-enrollment

    Lecture 7: Hands-On Requesting a certificate offline using (CSR)

    Lecture 8: Hands-On Securing a website using certificate

    Lecture 9: Hands-On Encrypting and Decrypting a File with Certificate

    Chapter 6: Configuring CA Properties

    Lecture 1: Configuring CA Administration and Security

    Lecture 2: Configuring CA Policy and Exit Modules

    Lecture 3: Understanding CRLs, AIA and CDP Extensions

    Lecture 4: Configuring AIA and CDP Extension

    Chapter 7: New Roles in Certificate Services

    Lecture 1: New Roles in Certificate Services – Intro

    Lecture 2: Network Device Enrollment Service (NDES)

    Lecture 3: Configuring NDES – Part 1

    Lecture 4: Configuring NDES – Part 2

    Lecture 5: Understanding CEP and CES a.k.a. Enrollment Agents

    Lecture 6: Configuring CEP and CES

    Lecture 7: Online Responder a.k.a. OCSP

    Lecture 8: Configuring an Online Responder or OCSP

    Chapter 8: Bonus: Migrating Hashing Algorithm from SHA1 to SHA2 on Windows Server 2016 CA

    Lecture 1: Installing Root CA on Windows Server 2016

    Lecture 2: Installing Subordinate CA on Windows Server 2016

    Lecture 3: Planning Before Migrating Hashing Algorithm from SHA1 to SHA2

    Lecture 4: Migrating Hashing Algorithm from SHA1 to SHA2 on RootCA

    Lecture 5: Migrating Hashing Algorithm from SHA1 to SHA2 on Subordinate CA

    Lecture 6: Thank You

    Instructors

  • Cryptography- Learn Public Key Infrastructure from Scratch  No.2
    Himanshu Rana
    Consultant, Microsoft Certified Trainer
  • Rating Distribution

  • 1 stars: 39 votes
  • 2 stars: 57 votes
  • 3 stars: 208 votes
  • 4 stars: 564 votes
  • 5 stars: 674 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!