Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to PKI
- Core security concepts and terminology.
- Definition of Public Key Infrastructure.
- Digital certificates and signatures.
- Smart cards and hardware tokens.
- PKI standards and global frameworks.
Basic Cryptography
- Applications of cryptography in modern systems.
- History of cryptography and algorithm evolution.
- Symmetric vs. asymmetric encryption.
- Diffie-Hellman key exchange.
- Hashing for data integrity.
Practical Applications of Encryption and Related Challenges
- Secure email communication (S/MIME and PGP).
- Secure web connections (HTTPS/SSL).
- Digital signing of PDFs and documents.
- Encryption for files, disks, and containers.
- VPNs, wireless encryption, and cloud security.
- Encryption attacks and mitigation strategies.
Certificate Authorities and Certificate Lifecycle
- Public vs. private certificate authorities.
- Regulatory compliance and CA policy frameworks.
- Types of certificates and their specific uses.
- CA hierarchies and trust chains.
- Operational procedures: issuing, renewing, and revoking certificates.
- Revocation methods: CRL and OCSP.
- Key recovery and certificate templates.
- Installing and managing a CA.
CSCA Standards and Passport PKI
- Overview of CSCA (Country Signing Certification Authority).
- Application of CSCA in Machine Readable Travel Documents (MRTDs).
- ICAO PKD and global trust frameworks for ePassports.
- Implementing a national CSCA hierarchy.
- Certificate Master Lists and Document Signer Certificates.
- Security, compliance, and international alignment.
Advanced PKI Topics and Future Trends
- Top 5 deployment issues and lessons learned.
- Top 10 risks and recommended mitigation strategies.
- Quantum-resistant cryptography and evolving standards.
- Zero Trust Architecture and PKI integration.
- Future trends in digital identity and trust frameworks.
Summary and Next Steps
Requirements
- Knowledge of networking fundamentals.
- Foundational understanding of cryptography concepts.
- General awareness of enterprise security policies.
Target Audience
- CIOs and Chief Security Officers.
- Security managers and internal auditors.
- IT professionals responsible for implementing and securing e-commerce and enterprise systems.
21 Hours
Testimonials (1)
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.