PKI Security Training

Course Summary

A Public Key Infrastructure (PKI) is an increasingly critical component to ensure confidentiality, integrity, and authentication in an enterprise. This course provides the knowledge and skills necessary to select, design and deploy a PKI to secure existing and future applications within your organization. It also provides an in-depth look into the foundations of cryptography and the working principles of the algorithms used.

During training, participants will gain in-depth knowledge on the following topics:

  • Trust in a digital world
  • Elements of a PKI
  • Trust models
  • PKI management
  • Legal aspects of PKI
  • Digital signature implementation
  • Time elements

Duration - 2 days

After completing the PKI course, you will be able to successfully design, setup, deploy, and manage a PKI.

Trainer’s Profile

Senior Consultant is a certified trainer for multiple vendors for more than 15 years. He worked for an international PKI vendor and for multiple big names in the worldwide industry. Senior Consultant will bring to the training an extended knowledge of both the theory and the practical implementations.

Table of Contents 

  1. Trust in a Digital World
    1. Trust and security concerns in a connected world
    2. Why PKI is getting a more and more  interest
  2. Foundations of Cryptography: Do you know Alice &   Bob?
    1. Introduction
    2. Information assurance issues
    3. Approaches to cryptography
    4. Public key cryptography functions
    5. Potential applications of Public key cryptography
  3. Elements of PKI
    1. PKI standards
    2. Infrastructure concepts
    3. X.509 certificates and certificate revocation Lists
    4. PKI architecture model
  4. Managing a PKI
    1. Introduction
    2. Policy approval authority as managerial body
    3. Policy and administration
  5. Pulling It All Together
    1. Defining your PKI security objectives
    2. Defining your PKI required services
  6. PKI Uses
    1. All Layers of IT
    2. PKI device
    3. Email signing and encryption
    4. PKI inside the enterprise
    5. PKI outside of the enterprise
  7. Legal Aspects
    1. Introduction
    2. Encryption-related  regulations
    3. Electronic Signature laws and regulations
    4. European directive focus
    5. Legal and technical requirements
  8. Focus on Digital Signatures
    1. Digital signatures: an e-revolution
    2. Implementing Digital signatures
  9. Importance of Time
    1. Time Source
    2. Time in long-term conservation