key
Mobile Application Security – CompTIA Security+ SY0-401: 4.2
Managing the applications running on mobile devices requires some additional security planning. In this video, you’ll learn about key management, managing credentials, geo-tagging, and application whitelisting.
Understanding PKI – CompTIA Network+ N10-005: 5.3
Setting up a Public Key Infrastructure is a complex process, but it can be a very useful part of an organization’s overall security strategy. In this video, you’ll learn about the importance of certificates and the importance of planning a PKI.
CompTIA Security+ SY0-301: 6.4 – Implementing Public and Private Keys
The generation of digital certificates is a staple of any PKI. In this video, you’ll learn how to build a set of public and private keys in GPG.
CompTIA Security+ SY0-301: 6.4 – Implementing Key Recovery
The key recovery is a critical aspect of any PKI. In this video, you’ll learn how to create a Key Recovery Agent certificate to use in a Microsoft Active Domain environment.
CompTIA Security+ SY0-301: 6.4 – Implementing Key Revocation
The implementation of a key revocation process may vary depending on your PKI. In this video, you’ll learn how to use CRLs and the process for revoking a key used in a web-of-trust environment.
CompTIA Security+ SY0-301: 6.3 – Key Escrow
In some organizations, a third-party may have be part of a key escrow process. In this video, you’ll learn about the need for key escrow and how to implement it into your PKI process.
CompTIA Security+ SY0-301: 6.3 – Key Registration
A certificate is only as good as the trust associated with it. In this video, you’ll learn about key registration and the process that providers use to confirm the identify of certificate owners.
CompTIA Security+ SY0-301: 6.3 – Public and Private Keys
Asymmetric encryption technology has redefined our use of encryption with today’s technology. In this video, you’ll learn how this pair of keys allows use to encrypt, authenticate, manage non-repudiation, and validate our data.