O'Reilly logo

CompTIA Security+™: Review Guide, Second Edition by James Michael Stewart

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

6.4 Implement PKI, certificate management, and associated components

  • Certificate authorities and digital certificates
    • CA
    • CRLs
  • PKI
  • Recovery agent
  • Public key
  • Private keys
  • Registration
  • Key escrow
  • Trust models

There is not a clear distinction between the core concepts and the implementation of PKI in relation to how the Sec+ exam handles these issues. These topics are therefore discussed together in the previous Section 6.3.

There are numerous ways in which a PKI implementation could be configured. That said, here is one example of a PKI setup. Let’s say that an organization has decided to use PKI. For brevity’s sake, we will assume that they have incorporated all necessary standards, regulations, and guidelines into their local security policy. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required