PKI: Implement and Manage Training Course
This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used.
Duration: 21hrs
Course Content:
Introduction to PKI
- Basic Security Concepts
- Public Key Infrastructure Defined
- Digital Certificates and Signatures
- Smart Cards
- PKI Standards
Basic cryptography
- Uses of Cryptography
- History of Cryptography including early methods
- Symmetric and Asymmetric Encryption plus Algorithms
- Diffie-Hellman Key Generation
- Hashing for Integrity plus Algorithms
Practical uses for encryption and associated issues
- Signed and Encrypted Email using S/MIME and PGP
- Secure connections to websites
- Digitally signing PDFs
- Encrypting files
- Encrypting hard drives
- Encrypting “containers”
- SSL, VPN and Wireless
- PKI and Cloud Computing
- Attacks on Encryption
Certificate Authorities
- Public v Private CAs
- Regulations governing CAs
- CA Certificate Policies
- Types of Certificates Provided
- CA Hierarchies
- Certificate Authority Operations
- Certificate expiration
- Certificate revocation
- Certificate Revocation Lists (CRL)
- Online Certificate Status Protocol (OCSP)
- Key recovery
- Installing a CA and issuing certificates
- Certificate Templates
Summary
- Top 5 Deployment Issues
- Top 10 Risks
- Advanced PKI Topics and Futures
- Summary of Public Key Infrastructure