You’ve erased the data, but is it really gone? In this video, you’ll learn best practices for physical drive destruction, the use of destruction certificates, some formatting techniques, and how to securely erase individual files.
In Windows 7, where would you make a change to a user’s certificate information? A) Control Panel / User Accounts B) Administrative Tools / Global Security Policy C) Administrative Tools / Device Manager D) Control Panel / Certificate Manager E) One user had perfect attendance
Setting up a Public Key Infrastructure is a complex process, but it can be a very useful part of an organization’s overall security strategy. In this video, you’ll learn about the importance of certificates and the importance of planning a PKI.
The generation of digital certificates is a staple of any PKI. In this video, you’ll learn how to build a set of public and private keys in GPG.
The key recovery is a critical aspect of any PKI. In this video, you’ll learn how to create a Key Recovery Agent certificate to use in a Microsoft Active Domain environment.
Implementing a proper PKI involves a combination of process and software. In this video, you’ll see how to use Microsoft Certificate Services and the Microsoft Management Console to create and approve certificate requests.
The implementation of digital certificates can vary depending on the environment, but the overall process is relatively similar. In this video, you’ll see how Microsoft Certificate Services can be used to manage a PKI implementation.
The implementation of a key revocation process may vary depending on your PKI. In this video, you’ll learn how to use CRLs and the process for revoking a key used in a web-of-trust environment.
Implementing a certificate authority can include both commercial and private certificate authorities. In this video, you’ll learn the differences and similarities between a commercial and private CA.
Different PKIs are subject to different types of trust models. In this video, you’ll learn the many ways to implement trust models in different PKI infrastructures.