CompTIA Security+ 2008: Public Key Infrastructure and Access Security

This course is included in our On-demand training solution.


Access security, both within a network and on the Internet, is paramount to corporate security. Modern network environments use key encryption technologies in order to provide security and availability to both employees and customers. This course explores the use of certificate servers and certificates to provide a secure environment both within a network and when dealing with web servers and internet validations. It also examines how to secure the physical environment and data access. This course is one of a series in the SkillSoft learning path that covers the objectives for the CompTIA Security+ (2008 Edition) certification exam.

Target Audience

Organizations involved in IT services or training that need to have personnel qualified for onwards delivery of IT support or training; businesses that will need up-to-date Security+ training for their own internal networking support purposes; individuals who are personally interested in establishing credentials for the benefit of their own career prospects.


Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years on-the-job networking experience with an emphasis on security. The CompTIA Network+ certification is also recommended.

Expected Duration

210 min.

Course Objectives

Key Management and Life Cycle

  • recognize when to use the centralized and decentralized key-management models
  • distinguish between the processes in the setup phase of key life-cycle management
  • distinguish between the processes in the administrative phase of key life-cycle management
  • distinguish between the processes in the cancellation phase of key life-cycle management
  • Certificate Services Servers

  • install a standalone root Certificate Authority
  • implement a file-based certificate request
  • manage a certificate server
  • Installing and Managing a Standalone Root CA

    User Certificates and Key Recovery

  • grant users the log on locally right
  • revoke a certificate
  • establish an EFS recovery agent
  • Web Server Security with PKI

  • establish web server security with PKI
  • Enabling Recovery Agents and Web Server Security with PKI


  • recognize key considerations in the use of biometrics
  • Physical Access Security

  • recognize physical access security measures
  • Peripheral and Component Security

  • recognize security threats to system peripherals and components, and how to counteract them
  • configure security policy settings for mitigating risks to peripherals
  • Storage Device Security

  • encrypt individual files
  • encrypt an entire disk
  • Securing Peripherals, Files, and Disks