Plan du cours
Introduction to Encryption and Key Management
- Symmetric vs asymmetric encryption
- Key usage in data encryption and authentication
- Why key management matters for security and compliance
Key Lifecycle Management
- Key generation and distribution
- Key rotation and expiration
- Key archival and secure deletion
Access Control and Key Protection
- Role-based access to key operations
- Separation of duties and audit trails
- Hardware Security Modules (HSMs)
Key Management Systems and Architectures
- Overview of commercial and open-source KMS
- Architecture for secure key storage and management
- Integrating KMS with applications and services
Cloud Key Management Practices
- Key management in AWS, Azure, and Google Cloud
- Bring Your Own Key (BYOK) vs Cloud-native keys
- Multi-cloud key management strategies
Compliance and Auditing
- Key management in PCI DSS, HIPAA, GDPR, and NIST
- Auditing key usage and implementing alerting
- Incident response for compromised keys
Case Studies and Best Practices
- Enterprise-scale key management deployment
- Common pitfalls and mitigation strategies
- Designing your organization’s key management policy
Summary and Next Steps
Pré requis
- Understanding of basic encryption and cryptography concepts
- Experience working with IT infrastructure or security systems
- Familiarity with cloud environments is helpful
Audience
- Security engineers
- IT administrators managing sensitive data
- Compliance and risk professionals
Nos clients témoignent (5)
Le fait qu'il y avait des exemples pratiques avec le contenu
Smita Hanuman - Standard Bank of SA Ltd
Formation - Basel III – Certified Basel Professional
Traduction automatique
Le formateur était extrêmement clair et concis. Très facile à comprendre et à assimiler les informations.
Paul Clancy - Rowan Dartington
Formation - CGEIT – Certified in the Governance of Enterprise IT
Traduction automatique
Le formateur était très motivé et compétent. Le formateur n'a pas seulement été capable de transmettre les informations, elle a également ajouté de l'humour pour alléger le sujet théorique et parfois aride du cours.
Marco van den Berg - ZiuZ Medical B.V.
Formation - HIPAA Compliance for Developers
Traduction automatique
I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri
Formation - CISM - Certified Information Security Manager
Traduction automatique
I genuinely enjoyed the real examples of the trainer.
Joana Gomes
Formation - Compliance and the Management of Compliance Risk
Traduction automatique