Home > Store

Windows Server 2008 PKI and Certificate Security

Windows Server 2008 PKI and Certificate Security

Recorded Online Training

  • Your Price: $59.99
  • About Recorded Online Training
  • Almost like being there, our Recorded Online Training sessions are available for sale in recorded format.

    Link(s) and password to recorded WebExTMsession(s) accessible from your Account page after purchase.

Also available in other formats.

Register your product to gain access to bonus material or receive a coupon.


  • Copyright 2008
  • Recorded Online Training
  • ISBN-10: 0-7356-2516-6
  • ISBN-13: 978-0-7356-2516-7

Get in-depth guidance for designing and implementing certificate-based security solutions—straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration.



  1. Click the following link: Download the companion content.
  2. Click Save.
  3. Locate the .zip file on your computer. Right-click the file, click Extract All, and then follow the instructions.

Sample Content

Sample Pages

Download the sample content

Table of Contents

  • Acknowledgments
  • Foreword
  • Introduction
  • Foundations of PKI
    • Chapter 1: Cryptography Basics
    • Chapter 2: Primer to PKI
    • Chapter 3: Policies and PKI
  • Establishing a PKI
    • Chapter 4: Preparing an Active Directory Environment
    • Chapter 5: Designing a Certification Authority Hierarchy
    • Chapter 6: Implementing a CA Hierarchy
    • Chapter 7: Upgrading Your Existing Microsoft PKI
    • Chapter 8: Verifying and Monitoring Your Microsoft PKI
    • Chapter 9: Securing a CA Hierarchy
    • Chapter 10: Certificate Revocation
    • Chapter 11: Certificate Validation
    • Chapter 12: Designing Certificate Templates
    • Chapter 13: Role Separation
    • Chapter 14: Planning and Implementing Disaster Recovery
    • Chapter 15: Issuing Certificates
    • Chapter 16: Creating Trust Between Organizations
  • Deploying Application-Specific Solutions
    • Chapter 17: Identity Lifecycle Manager 2007 Certificate Management
    • Chapter 18: Archiving Encryption Keys
    • Chapter 19: Implementing SSL Encryption for Web Servers
    • Chapter 20: Encrypting File System
    • Chapter 21: Deploying Smart Cards
    • Chapter 22: Secure E-Mail
    • Chapter 23: Virtual Private Networking
    • Chapter 24: Wireless Networking
    • Chapter 25: Document and Code Signing
    • Chapter 26: Deploying Certificates to Domain Controllers
    • Chapter 27: Network Device Enrollment Service
    • Case Study Questions and Answers
  • About the Author


Submit Errata

More Information

Unlimited one-month access with your purchase
Free Safari Membership