English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 1h 32m | 190 MB
Active Directory Certificate Services (AD CS) allows workstations, servers, and applications to establish trust within an Active Directory forest without the cost of third-party certificates like TLS. This course shows how the AD CS role can be used to verify identity, encrypt communication, and establish trust in a Windows Server 2019 environment. Instructor Scott Burrell dissects the anatomy of a certificate and shows how to configure a public key infrastructure (PKI) in your own domain. He covers multiple ways to manually and automatically issue certificates and revoke certificates when they’re no longer needed via a certificate revocation list.
Topics include:
- Identifying trusted certificate authorities
- Breaking down the anatomy of a certificate
- Installing and configuring AD CS
- Backing up and recovering AD CS
- Creating and publishing certificate templates
- Enforcing certificate enrollment with AD Group Policy
- Creating an enrollment agent
- Configuring web-based certificate enrollment
- Revoking certificates
Table of Contents
Introduction
1 Extablishing trust with certificates
2 Things you should know
Certificates and Trust
3 The purpose of a certificate
4 Trusted certificate authorities
5 Anatomy of a certificate
6 Security properties of certificates
Public Key Infrastructure
7 The hierarchy of AD CS
8 Installing certificate services
9 Configuring a root authority
10 Configuring subordinate authorities
11 Backup and recovery of AD CS
12 Trusting your root CA
Managing Certificate Templates
13 Built-in vs. custom templates
14 Creating templates for AD
15 Security of a certificate template
16 Publishing certificate templates
Managing Issued Certificates
17 GPO for issuing certificates
18 Manual certificate enrollment
19 Using enrollment agents
20 Installing a Web enrollment server
21 Using a web enrollment server
22 Managing CRL distribution points
23 Using online responders
24 Configuring online responders
Conclusion
25 Next steps
Resolve the captcha to access the links!