Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to PKI
- Basic Security Concepts
- Public Key Infrastructure Defined
- Digital Certificates and Signatures
- Smart Cards
- PKI Standards
Basic cryptography
- Uses of Cryptography
- History of Cryptography including early methods
- Symmetric and Asymmetric Encryption plus Algorithms
- Diffie-Hellman Key Generation
- Hashing for Integrity plus Algorithms
Practical uses for encryption and associated issues
- Signed and Encrypted Email using S/MIME and PGP
- Secure connections to websites
- Digitally signing PDFs
- Encrypting files
- Encrypting hard drives
- Encrypting “containers”
- SSL, VPN and Wireless
- PKI and Cloud Computing
- Attacks on Encryption
Certificate Authorities
- Public v Private CAs
- Regulations governing CAs
- CA Certificate Policies
- Types of Certificates Provided
- CA Hierarchies
- Certificate Authority Operations
- Certificate expiration
- Certificate revocation
- Certificate Revocation Lists (CRL)
- Online Certificate Status Protocol (OCSP)
- Key recovery
- Installing a CA and issuing certificates
- Certificate Templates
Summary
- Top 5 Deployment Issues
- Top 10 Risks
- Advanced PKI Topics and Futures
- Summary of Public Key Infrastructure
Requirements
Audience
Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors.
21 Hours
Testimonials (1)
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.