PKI and Biometrics Implementation

Level
Total time

PKI and Biometrics Implementation

Perpetual Solutions
Logo Perpetual Solutions
Provider rating: starstarstarstarstar 10 Perpetual Solutions has an average rating of 10 (out of 1 reviews)

Need more information? Get more details on the site of the provider.

Starting dates and places

This product does not have fixed starting dates and/or places.

Description

Prerequisites:

Students must have completed the Network Defense and Countermeasures course, or attained the SCNP credential and completed the PKI Concepts and Planning Course.

Course Description:

This this course is suitable for Network Administrators, Network Security Administrators, Firewall and Server Administrators, IT managers, Candidates interested in advancing their SCNP credential. Delegates attending this course will be able to identify threats against the network and Develop Countermeasures using Biometrics; Implement a PKI solution; Creation and Implementation of Security policies; Development and Management of a Security Response Team.

This course includes the following modules:

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: .

Prerequisites:

Students must have completed the Network Defense and Countermeasures course, or attained the SCNP credential and completed the PKI Concepts and Planning Course.

Course Description:

This this course is suitable for Network Administrators, Network Security Administrators, Firewall and Server Administrators, IT managers, Candidates interested in advancing their SCNP credential. Delegates attending this course will be able to identify threats against the network and Develop Countermeasures using Biometrics; Implement a PKI solution; Creation and Implementation of Security policies; Development and Management of a Security Response Team.

This course includes the following modules:

PKI Solutions and Applications

  • Secure E-Mail Solutions
  • Secure SSL Applications
  • Secure VPN Solutions
  • Secure Document Transfer
  • Certificate Revocation
  • Administrative Reports

Strong Authentication Solutions

  • Fingerprint-based Biometrics Solutions
  • Logon
  • Screen lock
  • File Encryption
  • PKI and Smart Card Solutions
  • Smart Card Readers
  • Storing the Private Key
  • Digital Certificates

Secure E-Mail Implementation

  • Netscape Messenger
  • Microsoft Outlook
  • Microsoft Outlook Express
  • PGP Implementation
  • Sending Signed E-Mail Messages
  • Sending Encrypted E-Mail Messages
  • E-Mail Decryption

Certificate Server Deployment

  • CA Installation
  • CA Management
  • Jurisdictions
  • Certificate Issuance, Approval, and Denial Process
  • Subscriber Enrollment Management
  • Certificate Storage and Administration
  • Trusted Root Certificate

Sign-On Solutions

  • Secure Login to Desktop
  • Inactivity Control
  • Encryption of Network Traffic
  • Credential Storage
  • Smart Cards
  • Virtual Cards

File Encryption Solutions

  • Automatic File Encryption
  • Microsoft Encrypted File System (EFS)
  • Creating Protective Folders
  • Group Encryption
  • Key Recovery
  • Managing Keys

For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!

There are no reviews yet.

    Share your review

    Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

    There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.