Mastering Windows Server 2016 & PKI & Certificate Svcs ADCS

Master essential PKI skills with 'Mastering Windows Server 2016 & PKI & Certificate Svcs ADCS', perfect for IT security professionals aiming to elevate their secure solutions expertise.

Course Thumbnail

Essential Skills Gained

Checkmark

Design a certification authority hierarchy tailored to business needs.

Checkmark

Implement and manage PKI using Active Directory Certificate Services.

Checkmark

Deploy and manage smart cards and certificate-based authentication.

Checkmark

Secure web applications with SSL and certificate-based security solutions.

Format

  • Instructor-led
  • 3 days with lectures and hands-on labs.

Audience

  • Security Architect
  • IT Security Manager
  • Security Specialist
  • Computer Security Professional

Description

Get hands-on experience building secure solutions for Smart Cards, encryption, Secure Access and other exciting applications with Hasain Alshakarti, one of the world’s foremost experts on PKI. He will show you effective methods, helpful tools and products required – all based on real-world scenarios. Get a grip on Certificate Lifecycle Management using proprietary products to administrator smart cards and certificates. Install, configure, test, and manage PKI with Active Directory. The course will provide basic PKI expertise in design, standards and safety requirements when implementing PKI in your own environment. New features in Windows Server 2012 will be covered. Active Directory Certificate Services (ADCS) in Windows Server 2012 provides many new features and capabilities such as Virtual Smart Cards, Key-Based Renewal Support, Version 4 Certificate Templates, and PowerShell Deployment and Management.

Calendar icon

Upcoming Course Dates

No upcoming dates. Please check back later.

Course Outline

Download PDF

Overview of Public Key Infrastructure

  1. Introduction to PKI

  2. Introduction to Cryptography

  3. Certificates and Certification Authorities

Designing a Certification Authority Hierarchy

  1. Identifying CA Hierarchy Design Requirements

  2. Common CA Hierarchy Designs

  3. Documenting Legal Requirements

  4. Analyzing Design Requirements

  5. Designing a CA Hierarchy Structure

  6. Identifying Applications and Certificate Holders

  7. Identifying Technical and Business Requirements

  8. Designing a CA Hierarchy

Creating a Certification Authority Hierarchy

  1. Configuring CAPolicy.inf

  2. Creating an Offline CA

  3. Validating Certificates

  4. Planning CRL Publication

  5. Defining CRL and AIA Publication Settings

  6. Publishing the CRL and AIA Information

  7. Validating the PKI Health of your CA Hierarchy

Managing a Public Key Infrastructure (PKI)

  1. Introduction to PKI Management

  2. Managing Certificates

  3. Managing Certification Authorities

  4. Planning for Disaster Recovery

  5. Role Separation

  6. Restricting Certificate Managers

  7. Enabling Certificate Services Auditing

Configuring Certificate Templates

  1. Introduction to Certificate Templates

  2. Designing and Creating a Certificate Template

  3. Publishing a Certificate Template

  4. Managing Changes in a Certificate Template

  5. Delegating Certificate Template Administration Permissions

  6. Superseding a Certificate Template

Configuring Certificate Enrollment

  1. Introduction to Certificate Enrollment

  2. Enrolling Certificates Manually

  3. Autoenrolling Certificates

Key Archival and Recovery

  1. Introduction to Key Archival and Recovery

  2. Implementing Key Archival and Recovery

PKI Trust Between Organizations

  1. Introduction to Advanced PKI Hierarchies

  2. Qualified Subordination Concepts

  3. Configuring Constraints in a Policy.inf File

  4. Implementing Qualified Subordination

Deploying Smart Cards

  1. Introduction to Smart Cards

  2. Enrolling Smart Card Certificates

  3. Deploying Smart Cards

  4. Smart Card Enrollment Agent Requests

  5. Planning for Re-enrollment

Securing Web Traffic by Using SSL

  1. Introduction to SSL Security

  2. Enabling SSL on a Web Server

  3. Implementing Certificate-based Authentication

  4. Certificate Mapping in Active Directory

  5. Certificate Mapping in IIS

Configuring BitLocker Recovery

  1. Introduction to BitLocker Recovery

  2. Configuring BitLocker recovery

  3. Recovering BitLocker volumes

Code Signing

  1. Introduction to Code Signing

  2. Implementing code signing templates

  3. Managing trusted publisher

Your Team has Unique Training Needs.

Your team deserves training as unique as they are.

Let us tailor the course to your needs at no extra cost.