We may earn an affiliate commission when you visit our partners.
Himanshu Rana

What is this course about?

Do you wonder how SSL works on websites? And what is the significance of digital certificates in secure communication between two entities e.g. a client and a web server? Then you are in the right place.

In this course, we'll talk about PKI which means Public Key Infrastructure. This course provides students with the knowledge and skills to deploy and manage a 2-tier public key infrastructure (PKI) on windows servers to support applications that require certificate based security. Students get hands-on experience implementing the solution to secure websites, applications and devices.

Read more

What is this course about?

Do you wonder how SSL works on websites? And what is the significance of digital certificates in secure communication between two entities e.g. a client and a web server? Then you are in the right place.

In this course, we'll talk about PKI which means Public Key Infrastructure. This course provides students with the knowledge and skills to deploy and manage a 2-tier public key infrastructure (PKI) on windows servers to support applications that require certificate based security. Students get hands-on experience implementing the solution to secure websites, applications and devices.

Note: "This course is purely related to Microsoft PKI on windows server a.k.a. Active Directory Certificate Services (ADCS), Please go through the curriculum thoroughly before purchasing the course" 

What kind of materials are used? 

I’ve designed this course using Microsoft Official Curriculum (MOC). Training will be done through videos where you’ll find lectures and hands-on. 

Why take this Course?

There are many reasons to take this course. 

  1. One of the Best courses with more than a 4-star rating on this topic.

  2. This course is designed according to Microsoft Official Curriculum and taught by Microsoft Certified Trainer.

  3. Knowing the understanding level of students whether they are a beginner or advanced, this course is designed for all levels making it the best fit for everyone.

  4. You'll find lots of Hands-On in this course which will make you practically sound.

  5. And moreover, security is a hot subject in today's digital age, so why not learn about one of the major and most popular technique to secure your IT Infrastructure.

  6. At last, I am eager to see you succeed, I am offering you my help, assistance wherever required in learning this course. You can drop your queries in the Q&A section of the course and I'll make sure it will be responded promptly.

30/11/2018

Course updated: Included Lectures on Migrating Hashing Algorithm from SHA1 to SHA2

Enroll now

What's inside

Syllabus

Course Overview and Know your Instructor
Introduction
Students will be able to understand the fundamentals of PKI and its components
What is PKI
Read more
Uses of PKI
Components of PKI Solution
What is a digital Certificate
Students will be able to understand the basic use of certificates, Hashing alogirthms.
What Cryptography is all about
Symmetric and Asymmetric Encryption
What is Digital Signing
Encryption Algorithms
Hashing Algorithms
Students will be able to learn how to Install and configure CA.
overview of CA
Public Vs Private CA
Root and Subordinate CAs
Stand-Alone vs Enterprise CAs
Consideration for Implementing CA Hierarchy - Root and Subordinates
Hands-On Installing a Standalone Root CA
Hands-On Installing an Enterprise Subordinate CA
Students will be able to learn how to enroll or request certificates
Certificate Request or Enrollment - Intro
Certificate Templates
Types of Certificate Enrollment
Hands-On Requesting a Certificate using web Enrollment
Hands-On Requesting a certificate using MMC
Hands-On Requesting a certificate using Auto-enrollment
Hands-On Requesting a certificate offline using (CSR)
Hands-On Securing a website using certificate
Hands-On Encrypting and Decrypting a File with Certificate
Students will learn more deep into Configuring CA
Configuring CA Administration and Security
Configuring CA Policy and Exit Modules
Understanding CRLs, AIA and CDP Extensions
Configuring AIA and CDP Extension
Students will be able to learn working of certificates and configuring CAs options
New Roles in Certificate Services - Intro
Network Device Enrollment Service (NDES)
Configuring NDES - Part 1
Configuring NDES - Part 2
Understanding CEP and CES a.k.a. Enrollment Agents
Configuring CEP and CES
Online Responder a.k.a. OCSP
Configuring an Online Responder or OCSP
Students will understand the approach to migrate hashing algorithm from SHA1 to SHA2
Installing Root CA on Windows Server 2016
Installing Subordinate CA on Windows Server 2016
Planning Before Migrating Hashing Algorithm from SHA1 to SHA2
Migrating Hashing Algorithm from SHA1 to SHA2 on RootCA
Migrating Hashing Algorithm from SHA1 to SHA2 on Subordinate CA
Thank You

Save this course

Save Cryptography: Learn Public Key Infrastructure from Scratch to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cryptography: Learn Public Key Infrastructure from Scratch with these activities:
Review Cryptography Fundamentals
Solidify your understanding of fundamental cryptographic concepts before diving into PKI. This will make the course material easier to grasp.
Browse courses on Public Key Cryptography
Show steps
  • Review the differences between symmetric and asymmetric encryption.
  • Understand the purpose of hashing algorithms in cryptography.
  • Familiarize yourself with common cryptographic terms and definitions.
Read 'Cryptography and Network Security: Principles and Practice'
Supplement your learning with a comprehensive book on cryptography. This will provide a broader and deeper understanding of the concepts covered in the course.
Show steps
  • Read the chapters related to public key cryptography and digital certificates.
  • Take notes on key concepts and definitions.
  • Work through the examples and exercises provided in the book.
Set up a Test PKI Environment
Gain hands-on experience by setting up a test PKI environment. This will allow you to apply the concepts learned in the course and troubleshoot common issues.
Show steps
  • Install and configure a root CA on a Windows Server.
  • Install and configure a subordinate CA.
  • Request and issue certificates for various applications.
  • Test the functionality of the PKI environment.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Read 'PKI Uncovered: Certificate-Based Security Solutions'
Expand your knowledge of PKI with a book dedicated to certificate-based security solutions. This will provide a deeper understanding of the practical aspects of PKI implementation.
Show steps
  • Read the chapters related to certificate policies and trust models.
  • Take notes on key concepts and best practices.
  • Consider how the concepts apply to your own PKI environment.
Document Your PKI Setup
Reinforce your understanding by documenting the steps involved in setting up your PKI environment. This will also serve as a valuable reference for future projects.
Show steps
  • Create a detailed document outlining the steps taken to set up the PKI environment.
  • Include screenshots and diagrams to illustrate the configuration process.
  • Explain the purpose of each step and the reasoning behind the configuration choices.
Troubleshoot Certificate Enrollment Issues
Improve your problem-solving skills by practicing troubleshooting common certificate enrollment issues. This will prepare you for real-world scenarios.
Show steps
  • Simulate common certificate enrollment errors.
  • Diagnose the root cause of the errors.
  • Implement solutions to resolve the errors.
Contribute to an Open Source PKI Project
Deepen your understanding of PKI by contributing to an open-source project. This will allow you to work with experienced developers and learn from their expertise.
Show steps
  • Identify an open-source PKI project that aligns with your interests.
  • Review the project's documentation and code base.
  • Contribute bug fixes, documentation improvements, or new features.

Career center

Learners who complete Cryptography: Learn Public Key Infrastructure from Scratch will develop knowledge and skills that may be useful to these careers:
Security Engineer
A Security Engineer focuses on protecting computer systems and networks. This often involves implementing and managing security protocols, and understanding Public Key Infrastructure, which is a central component of many security systems. Knowledge of digital certificates, as taught in this course, is directly applicable to securing communications between clients and servers. This course provides hands-on experience with Microsoft's PKI on Windows Server, which builds a solid foundation for managing certificate-based security.
Systems Administrator
Systems Administrators are responsible for the upkeep, configuration, and reliable operation of computer systems, including servers. This course helps a Systems Administrator understand the fundamentals of PKI and how to deploy and manage it on Windows servers using Active Directory Certificate Services. The course's hands-on labs on installing and configuring Certificate Authorities, enrolling certificates, and securing websites are very relevant. Configuration of Certificate Revocation Lists, Authority Information Access and Certificate Distribution Point extensions also helps to secure your IT infrastructure.
Data Security Specialist
Data Security Specialists are responsible for protecting an organization's sensitive data from unauthorized access, use, or disclosure. Public Key Infrastructure is a core technology for data encryption and access control. This course helps a Data Security Specialist understand the fundamentals of PKI and how to use certificates to secure data. The hands-on experience encrypting and decrypting files with certificates provides practical skills for protecting sensitive information.
Cryptography Engineer
Cryptography Engineers design, implement, and test cryptographic systems. This role typically requires a strong understanding of cryptographic algorithms, protocols, and security standards, often requiring advanced degrees. This course provides practical experience with Public Key Infrastructure, a crucial aspect of applied cryptography. Students will understand encryption algorithms and hashing algorithms.
Application Security Engineer
Application Security Engineers specialize in securing software applications. This often involves implementing secure coding practices, performing security testing, and managing application security certificates. This course can give an Application Security Engineer a deeper understanding of how digital certificates work and how to use them to secure applications. You'll get hands-on experience encrypting and decrypting a file with a certificate.
IT Security Consultant
IT Security Consultants advise organizations on how to protect their information assets. This includes assessing security vulnerabilities, recommending security solutions, and implementing security best practices. The topics covered in the course, such as PKI deployment and certificate management, are directly applicable to the consultant's work of improving a client's security posture. The practical experience gained to secure websites, applications and devices makes the concepts come to life quickly.
Security Architect
Security Architects design the overall security structure of an organization's IT systems. A deep understanding of Public Key Infrastructure is necessary for this role, as PKI is a foundational element of many security architectures. The course helps you understand PKI components, digital certificates, and CA hierarchies to design secure systems. Configuring AIA and CDP Extension will come in handy when designing a security architecture.
Identity and Access Management Specialist
Identity and Access Management Specialists manage user identities and control access to resources. Public Key Infrastructure is often used for strong authentication and access control, making this course helpful for anyone in this role. This course can help the specialist with certificate enrollment and configuration of certificate authority. You'll also learn about configuring Online Responders and OCSP.
IT Auditor
IT Auditors evaluate and assess the security controls of an organization's IT systems. This role requires an understanding of security technologies such as Public Key Infrastructure to assess whether they are properly implemented and managed. This course can help the IT Auditor learn about digital certificates, certificate enrollment, and configuring Certificate Authorities. Migration Hashing Algorithm from SHA1 to SHA2 is a particularly relevant topic.
Security Analyst
Security Analysts monitor security systems, investigate security incidents, and recommend security improvements. An understanding of Public Key Infrastructure is helpful for analyzing security logs and identifying potential security threats related to certificates. This course covers how to secure websites using certificates, and how to encrypt and decrypt files with certificates.
Network Engineer
Network Engineers design, implement, and manage computer networks. Securing network communications is a critical aspect of this role, making knowledge of Public Key Infrastructure essential. This course may be useful as it covers PKI components, digital certificates, and encryption algorithms. The ability to configure Network Device Enrollment Service, as covered in this course, allows the network engineer to automate the certificate enrollment process for network devices. The course's focus on Microsoft PKI on Windows Server provides a strong technical base.
Cloud Security Engineer
Cloud Security Engineers focus on securing cloud-based infrastructure and applications. As cloud environments heavily rely on encryption and certificate-based authentication, this role requires a strong understanding of Public Key Infrastructure. This course may be useful to understand PKI components and digital certificates. The course's coverage of deploying and managing PKI on Windows Servers helps one to understand the underlying principles of certificate-based security in a cloud environment.
Penetration Tester
Penetration Testers, also known as ethical hackers, attempt to find security vulnerabilities in systems and networks. A knowledge of Public Key Infrastructure and how it can be exploited is valuable for penetration testing. This course gives penetration testers background knowledge on PKI components and digital certificates. You will also learn how to secure a website using certificates.
Compliance Officer
Compliance Officers ensure that an organization adheres to relevant laws, regulations, and internal policies. This often includes ensuring that security controls are in place and properly managed, which involves understanding technologies like Public Key Infrastructure. This course can help a Compliance Officer understand digital certificates and certificate management. The student will be able to understand the fundamentals of PKI and its components.
DevOps Engineer
DevOps Engineers automate and streamline the software development and deployment process. Security is a crucial aspect of DevOps, and knowledge of Public Key Infrastructure is useful for securing applications and infrastructure. This course can help a DevOps Engineer automate certificate management and secure communication between services. Hands on experience requesting a certificate using auto-enrollment will be invaluable as DevOps roles require strong automation skills.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cryptography: Learn Public Key Infrastructure from Scratch.
Provides a comprehensive overview of cryptography and network security principles. It covers a wide range of topics, including symmetric and asymmetric encryption, hashing algorithms, digital signatures, and PKI. It serves as an excellent reference for understanding the underlying concepts of PKI and its applications. This book is commonly used as a textbook at academic institutions.
Delves into the practical aspects of implementing and managing PKI solutions. It covers various topics, including certificate policies, trust models, and key management. It valuable resource for understanding the complexities of PKI and designing secure certificate-based systems. This book is more valuable as additional reading than it is as a current reference.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser