Get in Touch

Course Outline

Introduction to PKI

  • Core security concepts and terminology.
  • Definition of Public Key Infrastructure.
  • Digital certificates and signatures.
  • Smart cards and hardware tokens.
  • PKI standards and global frameworks.

Basic Cryptography

  • Applications of cryptography in modern systems.
  • History of cryptography and algorithm evolution.
  • Symmetric vs. asymmetric encryption.
  • Diffie-Hellman key exchange.
  • Hashing for data integrity.

Practical Applications of Encryption and Related Challenges

  • Secure email communication (S/MIME and PGP).
  • Secure web connections (HTTPS/SSL).
  • Digital signing of PDFs and documents.
  • Encryption for files, disks, and containers.
  • VPNs, wireless encryption, and cloud security.
  • Encryption attacks and mitigation strategies.

Certificate Authorities and Certificate Lifecycle

  • Public vs. private certificate authorities.
  • Regulatory compliance and CA policy frameworks.
  • Types of certificates and their specific uses.
  • CA hierarchies and trust chains.
  • Operational procedures: issuing, renewing, and revoking certificates.
  • Revocation methods: CRL and OCSP.
  • Key recovery and certificate templates.
  • Installing and managing a CA.

CSCA Standards and Passport PKI

  • Overview of CSCA (Country Signing Certification Authority).
  • Application of CSCA in Machine Readable Travel Documents (MRTDs).
  • ICAO PKD and global trust frameworks for ePassports.
  • Implementing a national CSCA hierarchy.
  • Certificate Master Lists and Document Signer Certificates.
  • Security, compliance, and international alignment.

Advanced PKI Topics and Future Trends

  • Top 5 deployment issues and lessons learned.
  • Top 10 risks and recommended mitigation strategies.
  • Quantum-resistant cryptography and evolving standards.
  • Zero Trust Architecture and PKI integration.
  • Future trends in digital identity and trust frameworks.

Summary and Next Steps

Requirements

  • Knowledge of networking fundamentals.
  • Foundational understanding of cryptography concepts.
  • General awareness of enterprise security policies.

Target Audience

  • CIOs and Chief Security Officers.
  • Security managers and internal auditors.
  • IT professionals responsible for implementing and securing e-commerce and enterprise systems.
 21 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories