Course Outline
Introduction
- Overview of CipherTrust Manager and its primary functions
- CipherTrust initialization and IP configuration
Understanding CipherTrust ProtectDB (CDP), ProtectFile, and ProtectApp
- Utilizing ProtectDB (CDP)
- Utilizing ProtectApp
Working with CipherTrust Tokenization Server (CTS)
- Overview of the CTS solution
- Implementing tokenization
Working with CipherTrust Transparent Encryption (CTE)
- Overview of the CTE solution
- Implementing the CTE solution
CipherTrust Cloud Key Manager (CCKM)
- Overview of the CCKM solution
- Implementing the CCKM solution
CipherTrust Key Management Interoperability Protocol (KMIP)
- Implementing the KMIP solution
Summary and Next Steps
Requirements
- Familiarity with security protocols and best practices
- Experience in system administration and configuration
Audience
- IT professionals
- Security administrators
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.