Security+ Domain 5.0: Risk Management: Chapter 29

  1. Security+ Certification
  2. Security+: Definitions and Catchwords
  3. Security+ Domain 1.0: Threats, Attacks and Vulnerabilities
  4. Security+ Domain 2.0: Technologies and Tools, Chapter 6
  5. Security+ Domain 2.0: Technologies and Tools, Chapter 7
  6. Security+ Domain 2.0: Technologies and Tools, Chapter 8
  7. Security+ Domain 2.0: Technologies and Tools, Chapter 9
  8. Security+ Domain 2.0: Technologies and Tools, Chapter 10
  9. Security+ Domain 3.0: Architecture and Design: Chapter 11
  10. Security+ Domain 3.0: Secure Systems Design and Deployment: Chapter 12
  11. Security+ Domain 3.0: Secure Systems Design and Deployment: Chapter 12 cont’d
  12. Security+ Domain 3.0: Architecture and Design: Chapter 13: Embedded Systems
  13. Security+ Domain 3.0: Architecture and Design: Chapter 14: Application Development
  14. Security+ Domain 3.0: Architecture and Design: Chapter 15: Cloud and Virtualization
  15. Security+ Domain 3.0: Architecture and Design: Chapter 16: Resiliency and Automation
  16. Security+ Domain 3.0: Architecture and Design: Chapter 17: Physical Security
  17. Security+ Domain 4.0: Identity and Access Management: Chapter 18
  18. Security+ Domain 4.0: Identity and Access Management: Chapter 19
  19. Security+ Domain 4.0: Identity and Access Management: Chapter 20
  20. Security+ Domain 5.0: Risk Management: Chapter 21
  21. Security+ Domain 5.0: Risk Management: Chapter 22
  22. Security+ : Sample Questions
  23. Security+ Domain 5.0: Risk Management: Chapter 23
  24. bastion.inf
  25. Security+ Domain 5.0: Risk Management: Chapter 24
  26. Security+ Domain 5.0: Risk Management: Chapter 25
  27. Security+ Domain 5.0: Risk Management: Chapter 26
  28. Security+ Domain 5.0: Risk Management: Chapter 27
  29. Security+ Domain 5.0: Risk Management: Chapter 28
  30. Security+ Domain 5.0: Risk Management: Chapter 29
  31. Security+: My Favorite Free Tools

Chapter 29: Public Key Infrastructure (PKI)

Components

RA

CA

Third-party trust model

Certificate Authority

Intermediate CA

Revocation

CRL

OCSP

Suspension

CSR

X.509: the Certificate Standard

Version Number (usually 1)

Subject (the certificate owner)

Public Key (the whole point)

Issuer (the CA, like Verisign)

Serial Number

Validity: To and From Dates

Certificate Usage (signing, email, encryption)

Signature Algorithms (of the hashing and digital signature algos)

Extension (custom data)

Public Key

Private Key

OID

Online and Offline CAs

Stapling

Pinning

Trust Models

Key Escrow

Certificate Chaining

Types of Certs

End-entity certs

CA certs

Cross-certification certs

Policy certs

Wildcard certs

Code-signing certs

Self-signed certs

Machine / Computer

Email

User

Root

Domain validation

Extended validation

Certificate Formats

.der

.pem

.cer / .crt

.key

.pfx

.p12

.p7b