Hands on Security Training Courses

Hands on Security Training

Hands on Security courses

Hands on Security Course Outlines

Code Name Duration Overview
pkiimpman PKI: Implement and Manage 21 hours Overview This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used. Throughout the whole course, participants will gain in-depth knowledge on the following topics: Legal aspects of a PKI Elements of a PKI PKI management Trust in a digital world Digital signature implementation Trust models After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI). This is a 3-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organisation. Objectives To introduce the student to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities. To give students hands on experience of implementing and using PKI solutions with a variety of applications. To give students an understanding of the concepts of evaluating and selecting PKI technologies Audience Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors. Introduction to PKI Basic Security Concepts Public Key Infrastructure Defined Digital Certificates and Signatures Smart Cards PKI Standards Basic cryptography Uses of Cryptography History of Cryptography including early methods Symmetric and Asymmetric Encryption plus Algorithms Diffie-Hellman Key Generation Hashing for Integrity plus Algorithms Practical uses for encryption and associated issues Signed and Encrypted Email using S/MIME and PGP Secure connections to websites Digitally signing PDFs Encrypting files Encrypting hard drives Encrypting “containers” SSL, VPN and Wireless PKI and Cloud Computing Attacks on Encryption Certificate Authorities Public v Private CAs Regulations governing CAs CA Certificate Policies Types of Certificates Provided CA Hierarchies Certificate Authority Operations Certificate expiration Certificate revocation Certificate Revocation Lists (CRL) Online Certificate Status Protocol (OCSP) Key recovery Installing a CA and issuing certificates Certificate Templates Summary Top 5 Deployment Issues Top 10 Risks Advanced PKI Topics and Futures Summary of Public Key Infrastructure

Upcoming Courses

CourseCourse DateCourse Price [Remote / Classroom]
PKI: Implement and Manage - CO, Denver - Colorado Boulevard CenterMon, Jul 31 2017, 9:30 am$4550 / $6850

Other regions

Weekend Hands on Security courses, Evening Hands on Security training, Hands on Security boot camp, Hands on Security instructor-led , Evening Hands on Security courses, Hands on Security coaching, Hands on Security one on one training , Hands on Security trainer , Hands on Security classes,Weekend Hands on Security training, Hands on Security private courses, Hands on Security training courses, Hands on Security on-site

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients