CompTIA Security+ 2008: Public Key Infrastructure and Access Security


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Access security, both within a network and on the Internet, is paramount to corporate security. Modern network environments use key encryption technologies in order to provide security and availability to both employees and customers. This course explores the use of certificate servers and certificates to provide a secure environment both within a network and when dealing with web servers and internet validations. It also examines how to secure the physical environment and data access. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.

Target Audience
Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects.

Prerequisites
Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Expected Duration (hours)
3.5

Lesson Objectives

CompTIA Security+ 2008: Public Key Infrastructure and Access Security

  • recognize when to use the centralized and decentralized key-management models
  • distinguish between the processes in the setup phase of key life-cycle management
  • distinguish between the processes in the administrative phase of key life-cycle management
  • distinguish between the processes in the cancellation phase of key life-cycle management
  • install a standalone root Certificate Authority
  • implement a file-based certificate request
  • manage a certificate server
  • install and manage a standalone root CA
  • grant users the log on locally right
  • revoke a certificate
  • establish an EFS recovery agent
  • establish web server security with PKI
  • enable an EFS recovery agent
  • set up web server security with PKI
  • recognize key considerations in the use of biometrics
  • recognize physical access security measures
  • recognize security threats to system peripherals and components, and how to counteract them
  • configure security policy settings for mitigating risks to peripherals
  • encrypt individual files
  • encrypt an entire disk
  • configure security policy settings for mitigating risks to peripherals
  • secure an individual file and an entire disk
  • Course Number:
    cs_sety_a05_it_enus