The private keys of the code-signing certificate can be stored in an HSM to eliminate the risks associated with stolen, corrupted, or misused keys.
Course Date: Aug 22, 2022 - Aug 24, 2022
$2,990.00
PKI course is recommended for anyone using or managing certificates, designing or deploying a PKI enterprise solution, or evaluating & selecting a commercial PKI Technology Solution
Module 01: Introduction to PKI
Module 02: Certificate Revocation and Chain Building
This module will Give you a vital understanding of
Module 03: Deploy a Two-Tier PKI Hierarchy
In this module, you will learn:
Module 04: Certificate Templates and Enrollment Methods
This module covers the purpose of certificate templates. Configuration and management will be explained in addition to different enrollment methods. This module will give you an overview of:
Module 05: Enhancements in Windows Server 2012 R2
Windows Server 2019 and Windows 8 introduce a lot of new PKI-related features:
Module 06: Public Key Infrastructure (PKI) Maintenance & Availability Operations
CA Operations
Module 07: Cloud PKI Hierarchy
In this module, you will learn:
Every student that attends and completes the full training scoring 70% in the PKI exam will receive a certificate of completion.
Along with online training courses, we also offer on-site training programs. We deliver a tailor made training program to fit your needs, and to address customization based on any additional training the customer needs.
Please submit your
Leave your message and we'll get back to you shortly.
Please submit your
You're one step away
Please submit your details to
Please submit your details to
Please submit your details to
Please submit your details to
Get in Touch
Please submit your details to
Please submit your details to
Please submit your details to
Please submit your details to
Please submit your
Please provide your contact details
Register to watch the
The private keys of the code-signing certificate can be stored in an HSM to eliminate the risks associated with stolen, corrupted, or misused keys.
Client-side hashing ensures build performance and avoids unnecessary movement of files to provide a greater level of security
The command line signing tool provides a faster method to sign requests in bulk
Robust access control systems can be integrated with LDAP and customizable workflows to mitigate risks associated with granting wrong access to unauthorized users, allowing them to sign code with malicious certificates
Support for customized workflows of an “M of N” quorum with multi-tier support of approvers
Support for InfosSec policies to improve adoption of the solution and enable different business teams to have their own workflow for Code Signing
Validation of code against UpToDate antivirus definitions for virus and malware before digitally signing it will mitigate risks associated with signing malicious code