Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
SCP Level Two - PKI & Biometrics
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Security Training

Overview

PKI and Biometrics Implementation is a combination of instructor-led lecture, in-class discussions, and hands-on lab exercises. There are six domains covered in the course, covering issues such as:

PKI Solutions
File Encryption Solutions
Deploying a Certificate Server
Secure E-Mail Implementation

This course is intended for network administrators, network security administrators, firewall and server administrators, IT managers, and candidates interested in advancing their SCNP credential to the SCNA certification.

LEARNING OBJECTIVES

  • Identify threats against the network and develop countermeasures using biometrics
  • Implement a PKI solution
  • Creation and Implementation of Security policies
  • Development and Management of a Security Response Team
Prerequisites

Students must have completed the Network Defense and Countermeasures course, or attained the SCNP credential, and completed the PKI Concepts and Planning course, or possess equivalent knowledge.

Course duration

5 days

Course outline

PKI Solutions and Applications
 
Secure E-Mail Solutions
Secure SSL Applications
Secure VPN Solutions
Secure Document Transfer
Certificate Revocation
Administrative Reports

Certificate Server Deployment
 
CA Installation
CA Management Jurisdictions
Certificate Issuance, Approval, and Denial Process
Subscriber Enrollment Management
Certificate Storage and Administration
Trusted Root Certificate

Strong Authentication Solutions
 
Fingerprint-based Biometrics Solutions
Logon
Screen Lock
File Encryption
PKI and Smart Card Solutions
Smart Card Readers
Storing the Private Key
Digital Certificates

Sign-On Solutions
 
Secure Login to Desktop
Inactivity Control
Encryption of Network Traffic
Credential Storage
Smart Cards
Virtual Cards

Secure E-Mail Implementation
 
Netscape Messenger
Microsoft Outlook
Microsoft Outlook Express
PGP Implementation
Sending Signed E-Mail Messages
Sending Encrypted E-Mail Messages
E-Mail Decryption

File Encryption Solutions
 
Automatic File Encryption
Microsoft Encrypted File System (EFS)
Creating Protective Folders
Group Encryption
Key Recovery
Managing Keys

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved