Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Theoretical classes
- Basics of information security
- Identity verification
- Features and properties of electronic documents
- Basics of cryptography
- Implementations of cryptographic solutions in IT systems
- Certification Center
- Certification path and trust
- Qualified and unqualified certificates
- Verification of electronic signatures
- Certificate renewal and revocation
- Legal issues related to the use of electronic signatures
- Application of electronic signature certificates in Poland (e-administration, e-invoice, etc.)
- e-PUAP and trusted profile
Practical
- Fundamentals of Windows Server 2008R2/2012R2 Administration and Security
- BitLocker and TrueCrypt configuration
- Installation and configuration of the Certification Center in the Active Directory domain
- Certificate management in Windows 7/8/8.1,10
- Certificate management on cryptographic cards
- Signing and encrypting electronic documents
- Time stamping of electronic documents
- Email signing and encryption
- Login to the system using smart cards
- Configuring SSL certificates for websites
- Configuring EFS File Encryption
- IPSec configuration
- Signing PowerShell Scripts with CodeSign Certificates
Summary
Requirements
Basic knowledge of issues related to the administration of the MS Windows Server system (min. version 2003), as well as the client environment based on MS Windows 7/8/8.1 or 10
21 Hours
Testimonials (5)
The instructor's excellent level of knowledge, willingness, and kindness.
Luis Antonio Salazar Rivero - Banco de Mexico
Course - C/C++ Secure Coding
Machine Translated
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
The labs
Katekani Nkuna - Vodacom
Course - The Secure Coding Landscape
It opens up a lot and gives lots of insight what security
Nolbabalo Tshotsho - Vodacom SA
Course - Advanced Java Security
I was benefit from the exercises (SQL injection, XSS, CRSF. .).