This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT
training needs. Wintrac’s course catalog of over two thousand courses includes courses on Security Training
Overview
PKI Concepts and Planning is a combination of instructor-led lecture, in-class discussions, and hands-on lab exercises. There are six domains covered in the course, covering issues such as:
Cryptography Fundamentals
Digital Signatures
Biometric Fundamentals
PKI Fundamentals
This course is intended for network administrators, network security administrators, firewall and server administrators, IT managers, and candidates interested in advancing their SCNP credential to the SCNA certification.
LEARNING OBJECTIVES
- Identify threats against the network and develop countermeasures using biometrics
- Implement a PKI solution
- Creation and Implementation of Security policies
- Development and Management of a Security Response Team
Prerequisites
Students must have completed the Network Defense and Countermeasures course, attained the SCNP credential, or possess equivalent knowledge.
Course duration
5 days
Course outline
Cryptography Fundamentals
|
|
What is Cryptography
History of Encryption
Symmetric vs. Asymmetric
Combined Solutions
Private Key vs. Public Key
Data Encryption Standard (DES)
Advanced Encryption Standard (AES)
RSA, Diffie-Hellman
MD4, MD5, SHA-1
|
PKI Standards
|
|
X.509
S/MIME
LDAP
IPSec
Kerberos
IETF
PKI Standards (PKIX)
PKCS (1 through 15)
|
Strong Authentication |
|
Authentication Fundamentals
Identification vs. Verification
Two Factor Authentication
Strong Authentication
Smart Cards
Authentication and Biometrics
|
Biometrics Fundamentals
|
|
Fingerprint Scanning
Face Scanning
Iris Scanning
Hand Scanning
Retina Scanning
DNA Analysis
Voice Recognition
|
Digital Signatures
|
|
Definition and Characteristics
How they Work
Message Digest Functions
Digital Signatures with Message Digest
E-Signature Laws and Legal Issues
Key Length: 56, 112, and 128 bit
RSA and DSS Signature Standards
|
PKI Fundamentals
|
|
Terminology and Definition
Core Services
Digital Certificates
Certificate Authority
Key Distribution and Management
PKI Policies
Certificate Revocation Lists
LDAP and Enterprise Data Repository
|
|