Course Outline

Introduction to PKI

  • Basic Security Concepts
  • Public Key Infrastructure Defined
  • Digital Certificates and Signatures
  • Smart Cards
  • PKI Standards

Basic cryptography

  • Uses of Cryptography
  • History of Cryptography including early methods
  • Symmetric and Asymmetric Encryption plus Algorithms
  • Diffie-Hellman Key Generation
  • Hashing for Integrity plus Algorithms

Practical uses for encryption and associated issues

  • Signed and Encrypted Email using S/MIME and PGP
  • Secure connections to websites
  • Digitally signing PDFs
  • Encrypting files
  • Encrypting hard drives
  • Encrypting “containers”
  • SSL, VPN and Wireless
  • PKI and Cloud Computing
  • Attacks on Encryption

Certificate Authorities

  • Public v Private CAs
  • Regulations governing CAs
  • CA Certificate Policies
  • Types of Certificates Provided
  • CA Hierarchies
  • Certificate Authority Operations
  • Certificate expiration
  • Certificate revocation
    • Certificate Revocation Lists (CRL)
    • Online Certificate Status Protocol (OCSP)
  • Key recovery
  • Installing a CA and issuing certificates
  • Certificate Templates

Summary

  • Top 5 Deployment Issues
  • Top 10 Risks
  • Advanced PKI Topics and Futures
  • Summary of Public Key Infrastructure
  21 Hours
 

Testimonials

Related Courses

CAS for Administrators

  7 hours

CHFI - Certified Digital Forensics Examiner

  35 hours

Ethical Hacking and Countermeasures

  35 hours

Security Analyst

  35 hours

WEBAP - Web Application Security

  28 hours

Node.JS and Web Application Security

  21 hours

Embedded Systems Security

  21 hours

Interactive Application Security Testing (IAST)

  14 hours

Apache Shiro: Securing Your Java Application

  7 hours

Ethical Hacker

  35 hours

NetNORAD

  7 hours

Network Security Administrator

  35 hours

Web Security with the OWASP Testing Framework

  28 hours

Securing Windows Using PowerShell Automation

  42 hours

Shadowsocks: Set Up a Proxy Server

  7 hours