PKI and Biometrics Implementation
Starting dates and places
This product does not have fixed starting dates and/or places.
Description
Prerequisites:
Students must have completed the Network Defense and Countermeasures course, or attained the SCNP credential and completed the PKI Concepts and Planning Course.Course Description:
This this course is suitable for Network Administrators, Network Security Administrators, Firewall and Server Administrators, IT managers, Candidates interested in advancing their SCNP credential. Delegates attending this course will be able to identify threats against the network and Develop Countermeasures using Biometrics; Implement a PKI solution; Creation and Implementation of Security policies; Development and Management of a Security Response Team.
This course includes the following modules:
…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
Students must have completed the Network Defense and Countermeasures course, or attained the SCNP credential and completed the PKI Concepts and Planning Course.Course Description:
This this course is suitable for Network Administrators, Network Security Administrators, Firewall and Server Administrators, IT managers, Candidates interested in advancing their SCNP credential. Delegates attending this course will be able to identify threats against the network and Develop Countermeasures using Biometrics; Implement a PKI solution; Creation and Implementation of Security policies; Development and Management of a Security Response Team.
This course includes the following modules:
PKI Solutions and Applications
- Secure E-Mail Solutions
- Secure SSL Applications
- Secure VPN Solutions
- Secure Document Transfer
- Certificate Revocation
- Administrative Reports
Strong Authentication Solutions
- Fingerprint-based Biometrics Solutions
- Logon
- Screen lock
- File Encryption
- PKI and Smart Card Solutions
- Smart Card Readers
- Storing the Private Key
- Digital Certificates
Secure E-Mail Implementation
- Netscape Messenger
- Microsoft Outlook
- Microsoft Outlook Express
- PGP Implementation
- Sending Signed E-Mail Messages
- Sending Encrypted E-Mail Messages
- E-Mail Decryption
Certificate Server Deployment
- CA Installation
- CA Management
- Jurisdictions
- Certificate Issuance, Approval, and Denial Process
- Subscriber Enrollment Management
- Certificate Storage and Administration
- Trusted Root Certificate
Sign-On Solutions
- Secure Login to Desktop
- Inactivity Control
- Encryption of Network Traffic
- Credential Storage
- Smart Cards
- Virtual Cards
File Encryption Solutions
- Automatic File Encryption
- Microsoft Encrypted File System (EFS)
- Creating Protective Folders
- Group Encryption
- Key Recovery
- Managing Keys
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.