pt. I. Foundations of PKI -- 1. Cryptography basics -- 2. Primer to PKI -- 3. Policies and PKI -- pt. II. Establishing a PKI -- 4. Preparing an active director environment -- 5. Designing a certification authority hierarchy -- 6. Implementing a CA hierarchy -- 7. Upgrading your existing Microsoft PKI -- 8. Verifying and monitoring your Microsoft PKI -- 9. Securing a CA hierarchy -- 10. Certificate revocation -- 11. Certificate validation -- 12. Designing certificate templates -- 13. Role separation -- 14. Planning and implementing disaster recovery -- 15. Issuing certificates -- 16. Creating trust between organizations -- pt. III. Deploying application-specific solutions -- 17. Identity Lifecycle Manager 2007 certificate management -- 18. Archiving encryption keys -- 19. Implementing SSL encryption for Web servers -- 20. Encrypting file system -- 21. Deploying smart cards -- 22. Secure e-mail -- 23. Virtual private networking -- 24. Wireless networking -- 25. Document and code signing -- 26. Deploying certificates to domain controllers -- 27. Network device enrollment service -- A. Case study questions and answers.
0
Get in-depth guidance for designing and implementing certificate-based security solutions--straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration.