PKI – Implement and Manage

This course provides essential information to anyone designing, creating, or maintaining a Public Key Infrastructure (PKI), and leveraging PKI to provide authentication and/or encryption for applications.

Our Public key infrastructure course provides requisite knowledge and skills to select, design and deploy PKI, to secure existing and future applications within your organization. The PKI training provides you with a deeper look into the foundations of cryptography and the working principles of the algorithms being used.

Cyber Skills Training - Image of a woman

Course Style

Live Instructor led. Face-to-face or attend from anywhere.

Skill up and get certified, guaranteed

What is included?

  • 3 days of training
  • Course material/Slides
  • Classroom training Or Attend-From-Any-Where
  • Training delivered by Professionals with enormous industry experience

What you will Learn?

Gain in-depth knowledge on the following topics:

  • Legal aspects of a PKI
  • Elements of a PKI
  • PKI management
  • Trust in a digital world
  • Digital signature implementation
  • Trust models

NET SECURITY’S PKI training will equip you with in-depth vital knowledge and ins and outs of PKIs, make you capable to deploy and run system smoothly. After completing this course, you can efficiently perform following PKI related activities: public key certificates management, authenticate the identity, registration authority, issue digital certificates, secret key, root certificate, private key, trusted third party, encrypting data, public key cryptography, certificate signing, digitally sign, certificate authority ca, certificates issued, encrypt and decrypt, key to decrypt and key pair management.

Who should attend?

Anyone who is required to have an understanding of the concepts of PKI technologies

Course Dates

13 – 15 Mar, 2024
18 – 20 Sep, 2024

Course Outline

Introduction to PKI

⦁ Public Key Infrastructure Defined
⦁ Healthcare Security Model
⦁ Certification Architecture
⦁ Technology Views

Reliable E-Commerce

⦁ The House of Security
⦁ Security policies
⦁ Infrastructure
⦁ Authentication
⦁ Privacy and Confidentiality
⦁ Authorization
⦁ Integrity
⦁ Non-repudiation

Basic cryptography

⦁ Introduction and terms used
⦁ History
⦁ Fundamentals
⦁ Symmetric Encryption
⦁ Diffie-Hellman Key Generation
⦁ Asymmetric Encryption
⦁ Hashing
⦁ Signed and Encrypted Email
⦁ Attacks

Digital Signatures

⦁ The Need for Digital Signatures
⦁ Digital Signatures in Detail
⦁ Applications of Digital Signatures
⦁ Electronic or Digital Signature
⦁ Digital Signature and Digital Certificate

Digital Certificates

⦁ Need for Digital Certificates
⦁ What is a Digital Certificate
⦁ Certificate Types
⦁ Public Key Distribution in Certificates
⦁ Obtaining a Personal Certificate

PKI and Certificate Authorities

⦁ Public Key Infrastructure
⦁ Certificate Policies
⦁ Certificate Classification
⦁ Certificate Authority Hierarchy
⦁ Certificate Authority Operations

Infrastructure

⦁ Directories
⦁ Key Recovery Authority
⦁ Validation and OCSP
⦁ SSL, VPN and Wireless
⦁ Smart Cards
⦁ Roaming Solutions
⦁ Public Key Infrastructure Top 5 Deployment
⦁ Issues
⦁ Summary of Public Key Infrastructure (PKI)

Prerequisites

  • Regardless of prior level of knowledge, any member of your PKI team can benefit greatly from our Managing Robust Training Course.
  • This course provides essential information to anyone designing, creating, or maintaining a Public Key Infrastructure (PKI), and leveraging PKI to provide authentication and/or encryption for applications.

Are you ready to get started?