We may earn an affiliate commission when you visit our partners.
Greg Shields

This course explores how to design a Certificate Services infrastructure, implement and manage a Certificate Services infrastructure, implement and manage certificates, design and implement a federated identity solution, and design and implement Active Directory Rights Management Services.

Read more

This course explores how to design a Certificate Services infrastructure, implement and manage a Certificate Services infrastructure, implement and manage certificates, design and implement a federated identity solution, and design and implement Active Directory Rights Management Services.

In this course you'll learn how to design a multi-tier certificate authority hierarchy with offline root CA, plan for multi-forest CA deployment, Certificate Enrollment Web Services and Certificate Enrollment Policy Web Services, Network Device Enrollment Services, certificate validation and revocation, disaster recovery, trust between organizations including Certificate Trust Lists, cross certifications, and bridge CAs. You will also learn to configure and manage offline root CA, Certificate Enrollment Web Services and Certificate Enrollment Policy Web Services, Network Device Enrollment Services, and Online Certificates Status Protocol responders. We will also learn how to implement administrator role separation; implement and manage trust between organizations, including certificate trust lists, cross certifications, and bridge CAs; migrate CAs; monitor CA health; manage certificate templates, certificate deployment, validation, renewal, revocation, and publishing including internet-based clients, CAs, and network devices. We will configure and manage key archival and recovery, plan for and implement identity integration with cloud services and claims-based authentication, including planning and implementing Relying Party Trusts, integrate Web Application Proxy with AD FS, plan for and manage Active Directory Federation Services certificates, plan for and configure attribute stores including Active Directory Lightweight Directory Services, Claims Provider and Relying Party Trust Claim Rules, as well as plan for highly available AD RMS deployment, and AD RMS client deployment, manage Trusted User and Trusted Publishing Domains, manage federated identity support, upgrade or migrate AD RMS, and decommission AD RMS.

Enroll now

What's inside

Syllabus

Introduction
Design a Certificate Services Infrastructure
Implement and Manage a Certificate Services Infrastructure
Implement and Manage Certificates
Read more
Design and Implement a Federated Identity Solution
Design and Implement AD Rights Management Services

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Exploration of industry-standard Certificate Services infrastructure design, implementation, and management
Guidance on implementing and managing certificates, encompassing certificate validation, revocation, and disaster recovery
Instruction on designing and implementing a federated identity solution, integrating with cloud services and claims-based authentication
In-depth coverage of Active Directory Rights Management Services, including deployment, management, and decommissioning
Taught by Greg Shields, an experienced instructor recognized for his expertise in the field

Save this course

Save Overview of AWS to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Overview of AWS with these activities:
Review prior experience with computer hardware
This activity will help you revive your previous knowledge and enhance your current understanding.
Browse courses on Computer Hardware
Show steps
  • Recall experiences and knowledge in working with computer hardware
Review network topologies and architectures
This activity will refresh your knowledge on network topologies and help you in configuring AD FS in the future lessons.
Browse courses on Network Topologies
Show steps
  • Review different types of network topologies, such as bus, star, and ring
  • Review different types of network architectures, such as client-server, peer-to-peer, and cloud
Complete online tutorials on Active Directory
By following guided tutorials on Active Directory, you'll gain a deeper understanding of its concepts and management.
Browse courses on Active Directory
Show steps
  • Search for online tutorials or courses on Active Directory
  • Choose tutorials that cover topics relevant to the course, such as user management, group management, and permissions
  • Complete the tutorials, taking notes and applying what you learn
Show all three activities

Career center

Learners who complete Overview of AWS will develop knowledge and skills that may be useful to these careers:
Cloud Architect
A Cloud Architect plans, designs, and manages cloud computing systems. They use their knowledge of cloud computing technologies and services to create and maintain scalable, reliable, and secure cloud-based solutions. This course would be particularly helpful for Cloud Architects who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
DevOps Engineer
A DevOps Engineer is responsible for bridging the gap between development and operations teams. They work with both teams to ensure that software is developed, tested, and deployed efficiently and reliably. This course would be particularly helpful for DevOps Engineers who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. This course would be particularly helpful for Information Security Analysts who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Network Administrator
A Network Administrator is responsible for managing and maintaining an organization's computer networks. They ensure that the networks are up and running, and that they are secure and efficient. This course would be particularly helpful for Network Administrators who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Security Engineer
A Security Engineer is responsible for designing, implementing, and maintaining security measures to protect an organization's computer systems and networks. This course would be particularly helpful for Security Engineers who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining an organization's computer systems. They ensure that the systems are up and running, and that they are secure and efficient. This course would be particularly helpful for Systems Administrators who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Database Administrator
A Database Administrator is responsible for managing and maintaining an organization's databases. They ensure that the databases are up and running, and that they are secure and efficient. This course may be helpful for Database Administrators who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Software Developer
A Software Developer is responsible for designing, developing, and testing software applications. This course may be helpful for Software Developers who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
IT Manager
An IT Manager is responsible for planning, organizing, and directing the activities of an organization's IT department. This course may be helpful for IT Managers who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
IT Director
An IT Director is responsible for the overall management of an organization's IT department. This course may be helpful for IT Directors who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Chief Information Officer (CIO)
A Chief Information Officer (CIO) is responsible for the overall management of an organization's IT resources. This course may be helpful for CIOs who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Chief Technology Officer (CTO)
A Chief Technology Officer (CTO) is responsible for the overall management of an organization's technology strategy. This course may be helpful for CTOs who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Information Technology Consultant
An Information Technology Consultant provides advice and guidance to organizations on how to use IT to improve their business operations. This course may be helpful for Information Technology Consultants who want to learn more about how to design and implement a Certificate Services infrastructure, as well as how to implement and manage certificates, federated identity solutions, and Active Directory Rights Management Services.
Project Manager
A Project Manager is responsible for planning, organizing, and directing the activities of a project. This course may be helpful for Project Managers who are working on projects that involve the design and implementation of a Certificate Services infrastructure, or the implementation and management of certificates, federated identity solutions, or Active Directory Rights Management Services.
Business Analyst
A Business Analyst is responsible for analyzing and documenting business requirements. This course may be helpful for Business Analysts who are working on projects that involve the design and implementation of a Certificate Services infrastructure, or the implementation and management of certificates, federated identity solutions, or Active Directory Rights Management Services.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Overview of AWS.
A comprehensive guide to designing and implementing an identity and access management (IAM) solution, covering industry best practices and enterprise architectures. Provides a deep dive into specific IAM technologies, including Microsoft Active Directory, Azure Active Directory, and PKI.
A practical guide to deploying and managing Active Directory Rights Management Services (AD RMS) for protecting sensitive data. Provides detailed instructions on configuring AD RMS infrastructure, managing rights policies, and integrating with various applications.
Comprehensive textbook that covers the fundamental principles and algorithms of cryptography and network security.
Provides a unique perspective on security from the point of view of a former hacker, covering topics such as social engineering and phishing.
Comprehensive guide to security engineering, covering topics such as system design, threat modeling, and security testing.
A practical guide to managing and administering Active Directory. Includes step-by-step instructions and real-world examples for managing users, groups, domains, and Group Policy. Covers various Active Directory administration tasks, including troubleshooting and performance optimization.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Overview of AWS.
Windows Server 2022: Implement Active Directory...
Most relevant
Managing Identity Services using AD DS and Microsoft Entra
Most relevant
Cryptography: Learn Public Key Infrastructure from Scratch
Most relevant
Windows Server 2022: Deploy and Manage Active Directory...
Most relevant
Implementing Windows Server 2016 Identity Federation and...
Most relevant
Windows Server 2022 Administration
Most relevant
Privilege Escalation with Certify
Most relevant
Secure Access with Azure Active Directory
Most relevant
Implementing Active Directory Certificate Services in...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser