Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
SCP Level Two - PKI Concepts & Planning
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Security Training

Overview

PKI Concepts and Planning is a combination of instructor-led lecture, in-class discussions, and hands-on lab exercises. There are six domains covered in the course, covering issues such as:

Cryptography Fundamentals
Digital Signatures
Biometric Fundamentals
PKI Fundamentals

This course is intended for network administrators, network security administrators, firewall and server administrators, IT managers, and candidates interested in advancing their SCNP credential to the SCNA certification.

LEARNING OBJECTIVES

  • Identify threats against the network and develop countermeasures using biometrics
  • Implement a PKI solution
  • Creation and Implementation of Security policies
  • Development and Management of a Security Response Team
Prerequisites

Students must have completed the Network Defense and Countermeasures course, attained the SCNP credential, or possess equivalent knowledge.

Course duration

5 days

Course outline

Cryptography Fundamentals
 
What is Cryptography
History of Encryption
Symmetric vs. Asymmetric
Combined Solutions
Private Key vs. Public Key
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
RSA, Diffie-Hellman
MD4, MD5, SHA-1

PKI Standards
 
X.509
S/MIME
LDAP
IPSec
Kerberos
IETF
PKI Standards (PKIX)
PKCS (1 through 15)

Strong Authentication
 
Authentication Fundamentals
Identification vs. Verification
Two Factor Authentication
Strong Authentication
Smart Cards
Authentication and Biometrics

Biometrics Fundamentals
 
Fingerprint Scanning
Face Scanning
Iris Scanning
Hand Scanning
Retina Scanning
DNA Analysis
Voice Recognition

Digital Signatures
 
Definition and Characteristics
How they Work
Message Digest Functions
Digital Signatures with Message Digest
E-Signature Laws and Legal Issues
Key Length: 56, 112, and 128 bit
RSA and DSS Signature Standards

PKI Fundamentals
 
Terminology and Definition
Core Services
Digital Certificates
Certificate Authority
Key Distribution and Management
PKI Policies
Certificate Revocation Lists
LDAP and Enterprise Data Repository

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved