Pki - Certificate Infrastructure

Posted By: ELK1nG

Pki - Certificate Infrastructure
Published 1/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.35 GB | Duration: 2h 9m

Implementing PKI infrastructure in a organization

What you'll learn

Public key infrastructure

How traffic is encrypted using certificates

Authentication via certificates

Types of certificate extensions

Requirements

Basic understanding of windows server 2016

Basic understanding of windows 11

Description

In this course, we will explore the fundamentals of Public Key Infrastructure (PKI) and its role in securing digital applications, transactions, identities, and supply chains. By the end of this course, you will have a comprehensive understanding of how PKI works, its components, and its applications.Public Key Infrastructure (PKI) is a system that uses digital certificates to authenticate users, devices, and services. PKI uses asymmetric encryption to create a secure connection for data encryption and signing.How PKI worksAn organization requests a digital certificate from a Certificate Authority (CA).The Registration Authority (RA) verifies the identity of the organization or user.The CA issues the digital certificate, which is signed with the CA's private key.The CA publishes the public key, which can be used to encrypt or verify a digital signature.The public key is used to encrypt data, which is then decrypted with the private key.Components of PKICertificate Authority (CA)A trusted third-party that issues, stores, and signs digital certificates. CAs also maintain a Certificate Revocation List (CRL).Registration Authority (RA)Verifies the identity of the user or device requesting a digital certificate.Digital CertificateAn electronic credential that authenticates the identity of a user, device, or service.Certificate Lifecycle Management (CLM)Manages the lifecycle of digital certificates, including issuing, renewing, and revoking them.PKI is used to secure digital applications, transactions, identities, and supply chains.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Certificate Authority

Lecture 3 Topology

Lecture 4 Installing & Configuring AD & DNS Roles

Lecture 5 Configuring RootCA

Lecture 6 Configuring Sub-ordinate CA

Lecture 7 Securing domain website converting into https

Lecture 8 Securing domain webserver converting into https

Lecture 9 Configuring domain polices to issues certificates to machines & users

Lecture 10 Certificate Extension Types

Lecture 11 Online Responder to verify certificate

Beginners, students, learners