Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to PKI
- Core security concepts and terminology
- Definition of Public Key Infrastructure
- Digital certificates and signatures
- Smart cards and hardware tokens
- PKI standards and global frameworks
Foundations of Cryptography
- Applications of cryptography in contemporary systems
- History of cryptography and algorithm evolution
- Symmetric versus asymmetric encryption
- Diffie-Hellman key exchange
- Hashing for data integrity
Practical Applications of Encryption and Related Challenges
- Signed and encrypted email (S/MIME and PGP)
- Secure web connections (HTTPS/SSL)
- Digitally signing PDFs and documents
- Encryption for files, disks, and containers
- VPNs, wireless encryption, and cloud security
- Encryption attacks and mitigation strategies
Certificate Authorities and Certificate Lifecycle Management
- Public versus private certificate authorities
- Regulatory compliance and CA policy frameworks
- Types of certificates and their applications
- CA hierarchies and trust chains
- Operations: issuing, renewing, and revoking certificates
- Revocation methods: CRL and OCSP
- Key recovery and certificate templates
- Installing and managing a CA
CSCA Standards and Passport PKI
- Overview of CSCA (Country Signing Certification Authority)
- Utilization of CSCA in Machine Readable Travel Documents (MRTDs)
- ICAO PKD and global trust frameworks for ePassports
- Implementing a national CSCA hierarchy
- Certificate Master Lists and Document Signer Certificates
- Security, compliance, and international alignment
Advanced PKI Topics and Future Trends
- Top 5 deployment issues and lessons learned
- Top 10 risks and recommended mitigation strategies
- Quantum-resistant cryptography and evolving standards
- Zero Trust Architecture and PKI integration
- Future trends in digital identity and trust frameworks
Summary and Next Steps
Requirements
- Familiarity with core networking principles
- Basic understanding of cryptographic concepts
- General awareness of enterprise security policies
Target Audience
- Chief Information Officers (CIOs) and Chief Security Officers
- Security managers and internal auditors
- IT professionals tasked with implementing and securing e-commerce and enterprise systems
21 Hours
Testimonials (1)
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.