What Does MVP Stand For? It’s Not What You Think.
October 7, 2024
Article
Instructor: Packt - Course Instructors
Included with
Recommended experience
Intermediate level
This course is for IT pros learning how to manage PKI on Windows Servers. Basic knowledge in servers and networking is needed.
Recommended experience
Intermediate level
This course is for IT pros learning how to manage PKI on Windows Servers. Basic knowledge in servers and networking is needed.
Recall the steps to install, configure, and manage a two-tier PKI on Windows Server 2012 R2.
Explain how encryption and decryption work together in the context of PKI.
Configure CDP/CIA extensions and OCSP servers on a Windows Server.
Plan to install, configure, and manage a two-tier PKI on Windows Server 2012 R2, including migrating hashing from SHA1 to SHA2 (SHA256) .
Add to your LinkedIn profile
8 assignments
Add this credential to your LinkedIn profile, resume, or CV
Share it on social media and in your performance review
This video course explains how Secure Sockets Layer (SSL) works on websites and the importance of digital certificates in securing communication between clients and web servers. You'll learn to deploy and manage a two-tier PKI on Windows Servers, supporting applications requiring certificate-based security.
Starting with an introduction to PKI and digital certificates, the course covers cryptographic methods used for online data security. You'll explore certification authorities (CA), certificate requests, and services, and configure Network Device Enrollment Service (NDES), Certificate Enrollment Service (CES), and Certificate Enrollment Policy (CEP). A bonus topic includes migrating hashing algorithms from SHA1 to SHA2 on Windows Server 2016. By the end, you'll be proficient in deploying and configuring PKI on Windows Servers. Key learnings include - Managing a two-tier PKI on Windows Server 2012 R2 - Understanding encryption and decryption - Using SSL certificates for website security - Configuring CDP/CIA extensions and OCSP servers This course is ideal for candidates with basic knowledge of Windows Servers and networking, IT professionals wanting to learn about Active Directory Certificate Services (ADCS) on Windows infrastructure, and those in cybersecurity or identity and access management.
In this module, we will provide an overview of the course, outlining the main objectives and the topics that will be explored in the subsequent modules. You will also get a brief on what to expect in terms of learning outcomes and assessments.
1 video1 reading
In this module, we will delve into the fundamentals of Public Key Infrastructure (PKI), starting with its definition and significance. We will explore the diverse uses of PKI, identify the key components that make up a PKI solution, and understand the role and workings of digital certificates in maintaining secure communications.
4 videos1 assignment
In this module, we will explore the foundational aspects of cryptography, beginning with a broad overview of its principles. We will compare symmetric and asymmetric encryption techniques, delve into the concept of digital signing, and examine different encryption algorithms. Additionally, we will cover hashing algorithms and their role in ensuring data integrity.
5 videos1 assignment
In this module, we will cover the essential aspects of Certification Authorities (CAs), starting with an overview of their roles. We'll differentiate between public and private CAs, explore the structure of root and subordinate CAs, and compare stand-alone vs. enterprise CAs. Furthermore, we will discuss the considerations for setting up a CA hierarchy and provide practical, hands-on guidance for installing a standalone root CA and an enterprise subordinate CA.
7 videos1 assignment
In this section, we will explore the different methods for requesting and enrolling certificates. You will learn about certificate templates and the various types of certificate enrollment. The section includes hands-on activities such as requesting certificates through web enrollment, MMC, auto-enrollment, and offline using CSR. Additionally, we will secure a website using a certificate and encrypt and decrypt files with certificates.
9 videos1 assignment
In this section, we will delve into configuring various properties of a Certificate Authority (CA). You will learn how to manage CA administration and security settings, set up CA policy and exit modules, and understand the roles of Certificate Revocation Lists (CRLs), Authority Information Access (AIA), and CDP extensions. Finally, we will guide you through configuring AIA and CDP extensions to ensure proper certificate management and accessibility.
4 videos1 assignment
In this section, we will explore the new roles in Certificate Services and their importance. You will learn about the Network Device Enrollment Service (NDES) and its configuration in two parts. Additionally, we will cover the concepts and setup of Enrollment Agents, including Certificate Enrollment Policy (CEP) and Certificate Enrollment Services (CES). Finally, the section includes configuring an Online Responder (OCSP) to enhance certificate validation processes.
8 videos1 assignment
In this section, we will guide you through the process of migrating the hashing algorithm from SHA1 to SHA2 on Windows Server 2016 Certificate Authority (CA). You will learn how to install and configure both Root and Subordinate CAs. We'll cover the essential planning steps needed before initiating the migration to minimize potential issues. Finally, you will perform the migration on both the Root CA and the Subordinate CA, ensuring a secure and updated cryptographic environment. You will also learn how to validate the successful migration and troubleshoot any challenges that may arise.
6 videos2 assignments
Packt helps tech professionals put software to work by distilling and sharing the working knowledge of their peers. Packt is an established global technical learning content provider, founded in Birmingham, UK, with over twenty years of experience delivering premium, rich content from groundbreaking authors on a wide range of emerging and popular technologies.
Course
Coursera Instructor Network
Course
Microsoft
Course
Course
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Earn a degree from world-class universities - 100% online
Upskill your employees to excel in the digital economy
Yes, you can preview the first video and view the syllabus before you enroll. You must purchase the course to access content not included in the preview.
If you decide to enroll in the course before the session start date, you will have access to all of the lecture videos and readings for the course. You’ll be able to submit assignments once the session starts.
Once you enroll and your session begins, you will have access to all videos and other resources, including reading items and the course discussion forum. You’ll be able to view and submit practice assessments, and complete required graded assignments to earn a grade and a Course Certificate.
If you complete the course successfully, your electronic Course Certificate will be added to your Accomplishments page - from there, you can print your Course Certificate or add it to your LinkedIn profile.
This course is one of a few offered on Coursera that are currently available only to learners who have paid or received financial aid, when available.
You will be eligible for a full refund until two weeks after your payment date, or (for courses that have just launched) until two weeks after the first session of the course begins, whichever is later. You cannot receive a refund once you’ve earned a Course Certificate, even if you complete the course within the two-week refund period. See our full refund policy.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance.
These cookies enable the website to provide enhanced functionality and personalization. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly.