Public Key Infrastructure Management & Security

This is an international Live Virtual Class, which means you will share the learning experience in a group of IT pros from around the world! The class is taught in English by CQURE Cybersecurity Experts! Remember that this course is limited to 12 participants total to ensure the highest quality and unique learning experience! During this course you will have an opportunity to interact with the instructor and get their help with any problems you might encounter, just as if it was a regular class.

About The Course

This 5-day course is considered essential for anyone who would like to expand knowledge about Public Key Infrastructure (PKI) in Microsoft technologies. During the course PKI is covered in depth, starting from the best practices for implementing secure and reliable PKI and ending up with most common scenarios of certificates usage in the enterprise environment.

At the end of the course, you will be able to:

  • Understand the core essence of PKI and cryptography.
  • Evaluate and select appropriate PKI technologies.
  • Install and configure PKI environments according to the best practices taken from practical experience.
  • Secure existing PKI infrastructure.
  • Choose appropriate types and manage the certificate lifecycle.
  • Understand the benefits of certificates used in the infrastructure.
  • Adjust PKI to your business needs.
  • Become familiar with enterprise solutions that uses PKI and certificates for security.
  • Configure and use certificates in: IIS, VPN, Wi-Fi, file encryption, e-mail security and many more.

To be a security expert you just need to know how certificates work. This subject is literally everywhere, even when implementing simple services certificates at least they can be used somewhere within the solution. You will learn how to implement your PKI and use it to increase security of your organization!

Exercises
All exercises are based on Windows Server with additional Linux and virtual network appliances that covers common scenarios. After the workshop, you receive demo transcript, PowerPoint slides, PowerShell scripts, tools and lab instructions.

Certification
What is wonderful about our certification is that it is lifetime valid with no renewal fees – the technology changes, but fundamentals and attitude remain mostly the same. Our Virtual Certificates, which entitle you to collect CPE Points, are issued via Accredible.

Target Audience
Network administrators, infrastructure architects, security professionals, systems engineers, network administrators, IT professionals, security consultants and other people responsible for implementing network and perimeter security, Chief Security Officers.

What do you need to know?
PKI basics, being advanced in administering Windows system: typical experience in administering Windows systems and server platform.

Agenda

Module 1: Essence of PKI

This module introduces cryptography basics and fundamentals of public key infrastructure with detailed information about certificates.

  1. Cryptography basics
  2. Fundamentals of PKI
  3. Certificate types (X.509)
  4. Certification authorities
  5. Certificate Revocation Lists

Module 2: Designing and implementing CA Hierarchy

Module 2 covers one of the most important topics for successful and secure deployment of PKI in enterprise environment.

  1. Planning
  2. Preparing AD Environment
  3. Implementing CA Hierarchy
  4. Securing CA Hierarchy
  5. Role separation
  6. Security Policy

 

Module 3: PKI in Windows domain 

In this module, you will become familiar with important aspects of implementing PKI in Windows Server 2019 environment.

  1. Managing PKI
  2. Configuring Certificate Templates
  3. Configuring Certificate Enrollment
  4. Configuring Key Archival and
    Recovery
  5. Configuring Trust Between
    Organizations

 

Module 4: Upgrading PKI Infrastructure 

This module focuses on supported scenarios and challenges regarding migration and upgrade of existing infrastructure.

  1. Supported scenarios
  2. Upgrading certificate templates c. Migration scenarios 

 

Module 5: PKI Security 

This module reviews all aspects of security of PKI and certificates. We also cover physical security and usage of smartcards, TPM and HSM.

  1. Deploying certificates to Domain Controllers 
  2. Certificate Revocation 
  3. Certificate Validation 
  4. CDP, AIA and OCSP 
  5. Planning and implementing disaster recovery
  6. Deploying Smart Cards
  7. TPM Virtual Smartcard
  8. Private key security with HSM 

 

Module 6: Securing applications with PKI 

This module focuses on day-to-day operation and challenges in securing applications with certificates.

  1. Secure IIS Traffic with SSL
  2. IIS certificate store security
  3. IIS users authentication
  4. Windows logon with Smart Cards
  5. E-mail security
  6. Encrypting file system
  7. Document and code signing

 

Module 7: PKI for network security 

Last module covers how to use to PKI to increase network security.

  1. VPN
  2. Wireless Networking
  3. 802.1X and NPS
  4. Radius server
  5. Ipsec
  6. Mobile devices certificates with
    MDM, SCEP and NDE