SCOR: PKI & IKE


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

A major aspect of Internet-based security these days hinges upon the Public Key Infrastructure. In this course, you'll learn the basics of this critical set of technologies. PKI is the magic behind the use of seamless SSL/TLS authentication and encryption on the public Internet and this clever implementation of asymmetric encryption algorithms can also be used in your private enterprise. You'll continue your exploration of PKI by learning how to fulfill a certificate request. Finally, you'll learn about the Internet Key Exchange, including the differences between IKE v1 and v2. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.



Expected Duration (hours)
0.8

Lesson Objectives

SCOR: PKI & IKE

  • configure a CA in Linux
  • identify the key types used in PKI
  • identify the Linux command to create a self-signed certificate
  • identify the Linux command to manage a PKI environment
  • create a certificate request
  • generate a certificate from the certificate request
  • identify the second step to obtaining an SSL certificate
  • identify the features of IKE versions
  • identify the phases of IKE version 1
  • Course Number:
    it_ciscortv_03_enus

    Expertise Level
    Expert