MS2821 Designing and Managing a Public Key Infrastructure

Course

Inhouse

£ 1,195 + VAT

Description

  • Type

    Course

  • Methodology

    Inhouse

  • Duration

    4 Days

This four-day, instructor-led course providesstudents with the knowledge and skills to design, deploy, and manage a public keyinfrastructure (PKI) to support applications that require distributed security.Students get hands-on experience implementing solutions to secure PKI-enabledapplications and services, such as Microsoft Internet Explorer, MicrosoftExchange Server, Microsoft Internet Infor. Suitable for: This course is intended for IT systems engineerswho are responsible for designing and implementing security solutions.Individuals should have knowledge and experience to install and configure theActive Directory® directory service and security mechanisms for computersrunning Microsoft Windows® 2000 Server or Windows Server 2003 family.

About this course

Before attending this course, students must have. Familiarity with Windows 2000 or Windows Server 2003 core technologies, such as those described in the following Microsoft Official Curriculum (MOC) courses. Course 2274Managing a Microsoft Windows Server 2003 Environment. Course 2275Maintaining a Microsoft Windows Server 2003 Environment ...

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Introduction
This four-day, instructor-led course providesstudents with the knowledge and skills to design, deploy, and manage a public keyinfrastructure (PKI) to support applications that require distributed security.Students get hands-on experience implementing solutions to secure PKI-enabledapplications and services, such as Microsoft Internet Explorer, MicrosoftExchange Server, Microsoft Internet Information Server, Microsoft Outlook®, andremote access services.

Audience
This course is intended for IT systems engineerswho are responsible for designing and implementing security solutions.Individuals should have knowledge and experience to install and configure theActive Directory® directory service and security mechanisms for computersrunning Microsoft Windows® 2000 Server or Windows Server 2003 family.

At Course Completion
After completing this course, students will beable to:

Describe PKI and the major components of a PKI.

Design a certification authority (CA) hierarchy to meet business requirements.

Install Certificate Services to create a CA hierarchy.

Perform certificate management tasks, CA management tasks, and plan for disaster recovery of Certificate Services.

Create and publish a certificate template, and replace an existing certificate template.

Enroll a certificate manually, autoenroll a certificate, and enroll a smart card certificate.

Implement manual and automatic key archival and recovery in a Windows Server 2003 PKI.

Configure trust between organizations by configuring and implementing qualified subordination.

Deploy smart cards in a Windows environment.

Secure a Web environment by implementing SSL security and certificate-based authentication for Web applications.

Implement secure e-mail messages by using Microsoft Exchange Server in a Windows 2000 or Windows 2003 environment.

Prerequisites
Before attending this course, students must have:

Familiarity with Windows 2000 or Windows Server 2003 core technologies, such as those described in the following Microsoft Official Curriculum (MOC) courses:

Course 2274 : Managing a Microsoft Windows Server 2003 Environment

Course 2275 : Maintaining a Microsoft Windows Server 2003 Environment

Course 2152 : Implementing Microsoft Windows 2000 Professional and Server

Familiarity with Windows 2000 or Windows 2003 networking technologies, such as those described in the following MOC courses:

Course 2277 : Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services

Course 2153 : Implementing a Microsoft Windows 2000 Network Infrastructure

Familiarity with Windows 2000 or Windows 2003 directory services technologies, such as those described in the following MOC courses:

Course 2279 : Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure

Course 2154 : Implementing and Administering Microsoft Windows 2000 Directory Services

Microsoft Certified Professional Exams
This course will help the student prepare for thefollowing Microsoft Certified Professional exams:

Exam 70-214 : Implementing and Managing Security in a Windows 2000 Network Infrastructure

Exam 70-220 : Designing Security for a Microsoft Windows 2000 Network

Exam 70-298: Designing Security for a Microsoft Windows Server 2003 Network

Exam 70-299, Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Course Materials
The student kit includes a comprehensive workbookand other necessary materials for this class.

Course Outline

Module1: Overview of Public Key Infrastructure
This module explains the basic concepts of apublic key infrastructure (PKI) and its components. It also provides anoverview of the topics that will be explained in-depth in the course.
Lessons

Introduction to PKI

Introduction to Cryptography

Certificates and Certification Authorities
LabA: Identifying Trusted Root CAs

Creating a Custom MMC

Viewing CA Certificates in Certificates MMC

Analyzing CA Certificate Distribution Methods
After completing this module, students will be ableto:

Describe PKI and its basic components.

Describe how symmetric and public key encryption works.

Define the role of certificates and CAs in a PKI.

Module2: Designing a Certification Authority Hierarchy
This module introduces students to designing a CAhierarchy. It explains the major tasks that are involved, including identifyingbusiness and legal requirements and planning a Certification Authority (CA)hierarchy structure.
Lessons

Identifying CA Hierarchy Design Requirements

Common CA Hierarchy Designs

Documenting Legal Requirements

Analyzing Design Requirements

Designing a CA Hierarchy Structure
LabA: Designing a CA Hierarchy

Identifying Applications and Certificate Holders

Identifying Technical and Business Requirements

Designing a CA Hierarchy
After completing this module, students will be ableto:

Identify technical and business requirements for designing a CA hierarchy.

Describe common CA hierarchy designs.

Describe policies and documents for specifying the legal requirements of a CA hierarchy design.

Identify the impact of design requirements and determine design changes to a CA hierarchy design.

Design a CA hierarchy to meet business requirements.

Module3: Creating a Certification Authority Hierarchy
This module explains how to create a CA hierarchybased on a CA hierarchy design. Students also learn how to install CertificateServices, validate a certificate, and publish a certificate revocation list(CRL) and an Authority Information Access (AIA).
Lessons

Creating an Offline CA

Validating Certificates

Planning CRL Publication

Installing a Subordinate CA
LabA: Installing an Offline CA

Configuring CAPolicy.inf for installing the Offline Root CA

Installing the Offline Root CA
LabB: Publishing CRLs and AIAs

Defining CRL and AIA Publication Settings

Publishing the CRL and AIA Information

Adding the Web Server to Local Intranet Sites
LabC: Implementing a Subordinate Enterprise CA

Installing the Subordinate Enterprise CA

Validating the PKI Health of your CA Hierarchy
After completing this module, students will be ableto:

Create an offline root CA.

Design an infrastructure to validate certificates.

Design an infrastructure to publish CRLs.

Install a subordinate CA.

Module4: Managing a Public Key Infrastructure
This module explains how to manage a PKI bymanaging certificates and CAs. Students also learn how to recover a PKI in theevent of a failure.
Lessons

Introduction to PKI Management

Managing Certificates

Managing Certification Authorities

Planning for Disaster Recovery
LabA: Enabling Role Separation

Defining CA Administrators and Certificate Managers

Restricting Certificate Managers

Generating Certificate Requests

Testing CA Administrator Tasks

Testing Certificate Manager Tasks

Enabling Certificate Services Auditing
Lab B:Backing Up and Restoring a Certification Authority

Determining Backup Privileges

Backing Up Certificate Services

Removing the CA's Private Key from the CA Certificate Store

Restoring the System State Backup
After completing this module, students will be ableto:

Describe the use of roles in PKI management.

Perform certificate management tasks.

Perform CA management tasks.

Plan for disaster recovery of Certificate Services.

Module5: Configuring Certificate Templates
This module introduces students to certificatetemplates and how to design them. Students also learn about creating,publishing, and changing certificate templates.
Lessons

Introduction to Certificate Templates

Designing and Creating a Certificate Template

Publishing a Certificate Template

Managing Changes in a Certificate Template
LabA: Delegating Certificate Template Management

Delegating Certificate Template Administration Permissions
LabB: Designing a Certificate Template

Reviewing an Existing Certificate Template

Designing the Custom Code Signing Certificate Template
LabC: Configuring Certificate Templates

Creating a Certificate Template

Publishing a Certificate Template

Enrolling the Certificate Template

Superceding a Certificate Template
After completing this module, students will be able to :

Describe the function of certificate templates in a Windows Server 2003 PKI.

Design and create a certificate template.

Publish a certificate template.

Replace an existing certificate template with an updated certificate template.

Module6: Configuring Certificate Enrollment
In this module, students learn about the variousmethods of enrolling certificates. Students can either process the certificaterequests manually or automatically, depending upon the approval requirementfrom the certificate manager.
Lessons

Introduction to Certificate Enrollment

Enrolling Certificates Manually

Autoenrolling Certificates
LabA: Enrolling Certificates

Choosing an Enrollment Method

Enrolling Computer Certificates by Using the Certificate Enrollment Wizard

Creating a User Certificate Template that Enables Autoenrollment

Deploying the Certificates by Using Autoenrollment
After completing this module, students will be ableto:

Select the appropriate certificate enrollment method for a given scenario.

Enroll certificates manually.

Autoenroll certificates.

Enroll smart card certificates.

Module7: Configuring Key Archival and Recovery
This module describes the importance of creating astrategy for data and key recovery and explains the key archival and recoveryprocess. Students also learn how Windows XP and Windows Server 2003 enhancedata protection and data recovery.
Lessons

Introduction to Key Archival and Recovery

Implementing Manual Key Archival and Recovery

Implementing Automatic Key Archival and Recovery
LabA: Configuring Key Recovery

Publishing the Key Recovery Agent Certificate Template

Enrolling the Key Recovery Agent Certificates

Implementing Key Recovery on an Enterprise CA

Creating an Archive-enabled Certificate Template

Acquiring an ArchiveEFS Certificate

Performing Key Recovery
After completing this module, students will be ableto:

Describe the key archival and recovery process in a Windows Server 2003 PKI.

Implement manual key archival and recovery.

Implement automatic key archival and recovery.

Module8: Configuring Trust Between Organizations
Students learn how to extend an organization's PKItrust hierarchy to other organizations. By extending the trust hierarchy, anorganization's certificates can be used and trusted across organizations forpurposes like secure e-mail messages, client authentication, and serverauthentication.
Lessons

Introduction to Advanced PKI Hierarchies

Qualified Subordination Concepts

Configuring Constraints in a Policy.inf File

Implementing Qualified Subordination
Lab A:Implementing a Bridge CA

Creating a Qualified Subordination Signing Certificate Template

Configuring a Policy.inf File

Requesting a Qualified Subordination Signing Certificate

Generating a Cross Certification Authority Certificate for the Bridge CA

Modifying the Policy.inf File on the Bridge CA

Creating the Cross Certification Authority Certificate

Publishing the Bridge CA Cross Certification Authority Certificates

Issuing Certificates that Meet Qualified Subordination Constraints
After completing this module, students will be able to :

Describe advanced PKI hierarchies.

Describe how constraints are used in qualified subordination.

Configure a policy.inf file to implement qualified subordination constraints.

Implement qualified subordination between CA hierarchies.

Module9: Deploying Smart Cards
In this module, students learn how smart cardsprovide secure storage for data and also support authentication of users.Students also learn how to configure and deploy smart cards in a Windows Server2003 PKI environment.
Lessons

Introduction to Smart Cards

Enrolling Smart Card Certificates

Deploying Smart Cards
LabA: Deploying Smart Cards

Modifying and Publishing the Enrollment Agent Certificate Template

Acquiring the Enrollment Agent Certificates

Creating a Custom Smart Card Certificate

Enabling the Downloading of Unsafe Microsoft ActiveX® Controls

Performing Smart Card Enrollment Agent Requests

Configuring a Certificate to Require a Smart Card Signature during Autoenrollment

Signing an Autoenrollment Certificate Request with a Smart Card

Planning for Re-enrollment
After completing this module, students will be ableto:

Describe the use of smart cards for authentication in a Windows Server 2003 PKI environment.

Deploy smart cards for authentication in a Windows Server 2003 PKI environment.

Module10: Securing Web Traffic by Using SSL
This module explains how to secure a Webenvironment by implementing SSL security and certificate-based authenticationfor Web applications.
Lessons

Introduction to SSL Security

Enabling SSL on a Web Server

Implementing Certificate-based Authentication
LabA: Deploying SSL Encryption at a Web Server

Enabling SSL Encryption in IIS

Securing the Security Virtual Folder

Enabling Certificate Mapping in Active Directory

Enabling Certificate Mapping in IIS
After completing this module, students will be ableto:

Describe how security is implemented in a Web environment.

Configure IIS to implement SSL security.

Implement certificate-based authentication for Web applications.

Module11: Configuring E-mail Security
In this module, students learn how to implementsecure e-mail messages in an Exchange 2003 environment.
Lessons

Introduction to E-mail Security

Configuring Secure E-mail Messages

Recovering E-mail Private Keys

Migrating a KMS Database to a CA Running Windows Server 2003
LabA: Securing E-mail Messages in Exchange Server 2003

Creating Exchange Server 2003 Mailboxes

Creating and Publishing S/MIME Certificate Templates

Configuring Outlook 2002

Sending Secure E-mail Between Organizations
After completing this module, students will be ableto:

Describe how e-mail security is implemented by a server running Exchange in a Windows Server 2003 environment.

Securing e-mail messages in an Exchange 2003 environment.

Recover e-mail private keys.

Migrate a Key Management Service (KMS) database to a Windows Server 2003 Enterprise Edition enterprise CA.

MS2821 Designing and Managing a Public Key Infrastructure

£ 1,195 + VAT