Course: PKI Training – Implement and Manage
PKI Course Duration: 3 Days
|COURSE TITLE (COURSE CODE)||No. of Days||Jun 2016||Jul 2016||Aug 2016||Sep 2016||Oct 2016||Nov 2016||Dec 2016|
|PKI – Implement and Manage||3||20-22||28-30|
Net Security’s Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used.
Throughout the whole course, participants will gain in-depth knowledge on the following topics:
- Legal aspects of a PKI
- Elements of a PKI
- PKI management
- Trust in a digital world
- Digital signature implementation
- Trust models
After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI).
This is a 3-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organisation.
To introduce the student to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities.
To give students hands on experience of implementing and using PKI solutions with a variety of applications.
To give students an understanding of the concepts of evaluating and selecting PKI technologies
Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors.
Introduction to PKI
Basic Security Concepts
Public Key Infrastructure Defined
Digital Certificates and Signatures
Uses of Cryptography
History of Cryptography including early methods
Symmetric and Asymmetric Encryption plus Algorithms
Diffie-Hellman Key Generation
Hashing for Integrity plus Algorithms
Practical uses for encryption and associated issues
Signed and Encrypted Email using S/MIME and PGP
Secure connections to websites
Digitally signing PDFs
Encrypting hard drives
SSL, VPN and Wireless
PKI and Cloud Computing
Attacks on Encryption
Public v Private CAs
Regulations governing CAs
CA Certificate Policies
Types of Certificates Provided
Certificate Authority Operations
– Certificate Revocation Lists (CRL)
– Online Certificate Status Protocol (OCSP)
Installing a CA and issuing certificates
Top 5 Deployment Issues
Top 10 Risks
Advanced PKI Topics and Futures
Summary of Public Key Infrastructure