Introduction
  • Course Overview and Know your Instructor
Overview of Public Key Infrastructure
  • What is PKI
  • Uses of PKI
  • Components of PKI Solution
  • What is a digital Certificate
Overview of Cryptography
  • What Cryptography is all about
  • Symmetric and Asymmetric Encryption
  • What is Digital Signing
  • Encryption Algorithms
  • Hashing Algorithms
Certification Authority or CA
  • overview of CA
  • Public Vs Private CA
  • Root and Subordinate CAs
  • Stand-Alone vs Enterprise CAs
  • Consideration for Implementing CA Hierarchy - Root and Subordinates
  • Hands-On Installing a Standalone Root CA
  • Hands-On Installing an Enterprise Subordinate CA
Certificate Request or Enrollment Methods
  • Certificate Request or Enrollment - Intro
  • Certificate Templates
  • Types of Certificate Enrollment
  • Hands-On Requesting a Certificate using web Enrollment
  • Hands-On Requesting a certificate using MMC
  • Hands-On Requesting a certificate using Auto-enrollment
  • Hands-On Requesting a certificate offline using (CSR)
  • Hands-On Securing a website using certificate
  • Hands-On Encrypting and Decrypting a File with Certificate
Configuring CA Properties
  • Configuring CA Administration and Security
  • Configuring CA Policy and Exit Modules
  • Understanding CRLs, AIA and CDP Extensions
  • Configuring AIA and CDP Extension
New Roles in Certificate Services
  • New Roles in Certificate Services - Intro
  • Network Device Enrollment Service (NDES)
  • Configuring NDES - Part 1
  • Configuring NDES - Part 2
  • Understanding CEP and CES a.k.a. Enrollment Agents
  • Configuring CEP and CES
  • Online Responder a.k.a. OCSP
  • Configuring an Online Responder or OCSP
Bonus: Migrating Hashing Algorithm from SHA1 to SHA2 on Windows Server 2016 CA
  • Installing Root CA on Windows Server 2016
  • Installing Subordinate CA on Windows Server 2016
  • Planning Before Migrating Hashing Algorithm from SHA1 to SHA2
  • Migrating Hashing Algorithm from SHA1 to SHA2 on RootCA
  • Migrating Hashing Algorithm from SHA1 to SHA2 on Subordinate CA
  • Thank You