PKI and Biometrics Implementation

Level:
Total time:
http://www.perpetual-solutions.com/tr...
Provider: Logo Perpetual Solutions

Tip: Receive more information about the programme, starting dates & price. Or request a proposal from multiple providers for in-house training.

Overview

Your experience of this course?

Did you attend the course PKI and Biometrics Implementation at Perpetual Solutions? Help other people by submitting your review at Springest!

Springest will donate £1.- to the Edukans Foundation as a thank you for each review

 
Schedule:
Daytime
Run time:
5 days
Location type:
Open

price, completion, maximum participants, and starting dateplaces are unknown for this course.

Prerequisites:

Students must have completed the Network Defense and Countermeasures course, or attained the SCNP credential and completed the PKI Concepts and Planning Course.

Course Description:

This this course is suitable for Network Administrators, Network Security Administrators, Firewall and Server Administrators, IT managers, Candidates interested in advancing their SCNP credential. Delegates attending this course will be able to identify threats against the network and Develop Countermeasures using Biometrics; Implement a PKI solution; Creation and Implementation of Security policies; Development and Management of a Security Response Team.

This course includes the following modules:

Read the complete description

Description

Prerequisites:

Students must have completed the Network Defense and Countermeasures course, or attained the SCNP credential and completed the PKI Concepts and Planning Course.

Course Description:

This this course is suitable for Network Administrators, Network Security Administrators, Firewall and Server Administrators, IT managers, Candidates interested in advancing their SCNP credential. Delegates attending this course will be able to identify threats against the network and Develop Countermeasures using Biometrics; Implement a PKI solution; Creation and Implementation of Security policies; Development and Management of a Security Response Team.

This course includes the following modules:

PKI Solutions and Applications

  • Secure E-Mail Solutions
  • Secure SSL Applications
  • Secure VPN Solutions
  • Secure Document Transfer
  • Certificate Revocation
  • Administrative Reports

Strong Authentication Solutions

  • Fingerprint-based Biometrics Solutions
  • Logon
  • Screen lock
  • File Encryption
  • PKI and Smart Card Solutions
  • Smart Card Readers
  • Storing the Private Key
  • Digital Certificates

Secure E-Mail Implementation

  • Netscape Messenger
  • Microsoft Outlook
  • Microsoft Outlook Express
  • PGP Implementation
  • Sending Signed E-Mail Messages
  • Sending Encrypted E-Mail Messages
  • E-Mail Decryption

Certificate Server Deployment

  • CA Installation
  • CA Management
  • Jurisdictions
  • Certificate Issuance, Approval, and Denial Process
  • Subscriber Enrollment Management
  • Certificate Storage and Administration
  • Trusted Root Certificate

Sign-On Solutions

  • Secure Login to Desktop
  • Inactivity Control
  • Encryption of Network Traffic
  • Credential Storage
  • Smart Cards
  • Virtual Cards

File Encryption Solutions

  • Automatic File Encryption
  • Microsoft Encrypted File System (EFS)
  • Creating Protective Folders
  • Group Encryption
  • Key Recovery
  • Managing Keys

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

Reviews

There are no reviews yet. Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

More courses within this subject:

Compare 30,331 training programmes and courses

Subscribe to our newsletter?

Receive news, tips, articles, interviews and education on personal development each month.

Follow us on: Facebook Twitter LinkedIn

Sign up to create your own Learning Lists.

Not for humans