There are two primary forms of encryption in Windows Server, symmetric, and public key. In this video, learn how public key encryption works.
- [Instructor] While most people seem to have … not really any problem understanding … symmetric key encryption, public key encryption … or asymmetric key encryption, is a little bit … more confusing to many people. … So what I want to do here, is go through an inceptual … overview of how public key encryption works. … We're going to talk only users here by the way. … We're going to say that every user in our environment … has a pair of keys. … One of the keys in that particular pair, … would be accessible only to the individual user, … and therefore is known as the users private key. … Whereas the other key, in that same pair, … is publicly accessible, and that's why it's referred … to as that user's public key. … So if we take an example of an actual environment, … let's say we had 100 user's in our environment, … then we would have a total of 200 keys, … 'cause everybody has a pair of keys. … 100 private keys for each individual user, … and another 100 public keys that are still … part of the pair assigned to that user, …
Author
Released
6/21/2019- Implementing the Encrypting File System (EFS)
- Protecting your servers from malware
- Common network threats
- Implementing IPsec
- Securing file services
- Delegating privileges
- Configuring account lockout policies
- Managing advanced audit policies
Skill Level Intermediate
Duration
Views
Related Courses
-
Windows Server 2019: Implementing Group Policy
with Ed Liberman1h 25m Intermediate -
Windows Server 2019 Essential Training
with Scott M Burrell3h 18m Intermediate
-
Introduction
-
1. Server Hardening
-
Cryptography4m 5s
-
Public key encryption4m 29s
-
EFS overview4m 15s
-
Implementing EFS4m 6s
-
Malware protection4m 28s
-
-
2. Secure the Network
-
Network security threats4m 34s
-
Implementing IPSec6m 37s
-
-
3. Secure File Services
-
Quota templates4m 4s
-
Create quotas5m 1s
-
File screening5m 38s
-
4. Manage Privileged Identities
-
User rights4m 22s
-
Delegate privileges4m 39s
-
Create a taskpad4m 43s
-
Password policies5m 20s
-
Account lockout policies4m 41s
-
-
5. Configure Advanced Audit Policies
-
Audit policy3m 43s
-
Audit object access4m 38s
-
Manage advanced audit policy3m 12s
-
-
Conclusion
-
Next steps16s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Public key encryption