Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to PKI
- Basic Security Concepts
- Public Key Infrastructure Defined
- Digital Certificates and Signatures
- Smart Cards
- PKI Standards
Basic cryptography
- Uses of Cryptography
- History of Cryptography including early methods
- Symmetric and Asymmetric Encryption plus Algorithms
- Diffie-Hellman Key Generation
- Hashing for Integrity plus Algorithms
Practical uses for encryption and associated issues
- Signed and Encrypted Email using S/MIME and PGP
- Secure connections to websites
- Digitally signing PDFs
- Encrypting files
- Encrypting hard drives
- Encrypting “containers”
- SSL, VPN and Wireless
- PKI and Cloud Computing
- Attacks on Encryption
Certificate Authorities
- Public v Private CAs
- Regulations governing CAs
- CA Certificate Policies
- Types of Certificates Provided
- CA Hierarchies
- Certificate Authority Operations
- Certificate expiration
- Certificate revocation
- Certificate Revocation Lists (CRL)
- Online Certificate Status Protocol (OCSP)
- Key recovery
- Installing a CA and issuing certificates
- Certificate Templates
Summary
- Top 5 Deployment Issues
- Top 10 Risks
- Advanced PKI Topics and Futures
- Summary of Public Key Infrastructure
21 Hours
Testimonials (3)
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
See live real-time implementation of activities using sample application investigation/cracking tools.
Paweł - Ośrodek Przetwarzania Informacji – Państwowy Instytut Badawczy
Machine Translated
Very knowledgeable trainer, was able to adjust to audience knowledge, excellent industry experience and ability to relate to audience needs Excellent content preparation , tailored to needs discussed beforehand. Good supplement reading materials prepared by trainer