Pki - Certificate Infrastructure
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.35 GB | Duration: 2h 9m
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.35 GB | Duration: 2h 9m
Implementing PKI infrastructure in a organization
What you'll learn
Public key infrastructure
How traffic is encrypted using certificates
Authentication via certificates
Types of certificate extensions
Requirements
Basic understanding of windows server 2016
Basic understanding of windows 11
Description
In this course, we will explore the fundamentals of Public Key Infrastructure (PKI) and its role in securing digital applications, transactions, identities, and supply chains. By the end of this course, you will have a comprehensive understanding of how PKI works, its components, and its applications.Public Key Infrastructure (PKI) is a system that uses digital certificates to authenticate users, devices, and services. PKI uses asymmetric encryption to create a secure connection for data encryption and signing.How PKI worksAn organization requests a digital certificate from a Certificate Authority (CA).The Registration Authority (RA) verifies the identity of the organization or user.The CA issues the digital certificate, which is signed with the CA's private key.The CA publishes the public key, which can be used to encrypt or verify a digital signature.The public key is used to encrypt data, which is then decrypted with the private key.Components of PKICertificate Authority (CA)A trusted third-party that issues, stores, and signs digital certificates. CAs also maintain a Certificate Revocation List (CRL).Registration Authority (RA)Verifies the identity of the user or device requesting a digital certificate.Digital CertificateAn electronic credential that authenticates the identity of a user, device, or service.Certificate Lifecycle Management (CLM)Manages the lifecycle of digital certificates, including issuing, renewing, and revoking them.PKI is used to secure digital applications, transactions, identities, and supply chains.
Overview
Section 1: Introduction
Lecture 1 Introduction
Lecture 2 Certificate Authority
Lecture 3 Topology
Lecture 4 Installing & Configuring AD & DNS Roles
Lecture 5 Configuring RootCA
Lecture 6 Configuring Sub-ordinate CA
Lecture 7 Securing domain website converting into https
Lecture 8 Securing domain webserver converting into https
Lecture 9 Configuring domain polices to issues certificates to machines & users
Lecture 10 Certificate Extension Types
Lecture 11 Online Responder to verify certificate
Beginners, students, learners