• Online, Self-Paced
Course Description

A major aspect of Internet-based security these days hinges upon the Public Key Infrastructure. In this course, you'll learn the basics of this critical set of technologies. PKI is the magic behind the use of seamless SSL/TLS authentication and encryption on the public Internet and this clever implementation of asymmetric encryption algorithms can also be used in your private enterprise. You'll continue your exploration of PKI by learning how to fulfill a certificate request. Finally, you'll learn about the Internet Key Exchange, including the differences between IKE v1 and v2. This course can be used in preparation for the 350-701: Implementing and Operating Cisco Security Core Technologies (SCOR) certification exam.

Learning Objectives

{"identify the key types used in PKI","identify the Linux command to create a self-signed certificate","identify the Linux command to manage a PKI environment ","configure a CA in Linux"}

Framework Connections