Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to PKI
- Core security concepts and terminology
- Definition of Public Key Infrastructure
- Digital certificates and signatures
- Smart cards and hardware tokens
- PKI standards and global frameworks
Foundations of Cryptography
- Applications of cryptography in modern systems
- History of cryptography and algorithm evolution
- Symmetric vs. asymmetric encryption
- Diffie-Hellman key exchange
- Hashing for data integrity
Practical Applications of Encryption and Related Challenges
- Signed and encrypted email (S/MIME and PGP)
- Secure web connections (HTTPS/SSL)
- Digitally signing PDFs and documents
- File, disk, and container encryption
- VPNs, wireless encryption, and cloud security
- Encryption attacks and mitigation strategies
Certificate Authorities and Certificate Lifecycle
- Public vs. private certificate authorities
- Regulatory compliance and CA policy frameworks
- Types of certificates and their applications
- CA hierarchies and trust chains
- Operations: issuing, renewing, and revoking certificates
- Revocation methods: CRL and OCSP
- Key recovery and certificate templates
- Installing and managing a CA
CSCA Standards and Passport PKI
- Overview of CSCA (Country Signing Certification Authority)
- Application of CSCA in Machine Readable Travel Documents (MRTDs)
- ICAO PKD and global trust frameworks for ePassports
- Implementing a national CSCA hierarchy
- Certificate Master Lists and Document Signer Certificates
- Security, compliance, and international alignment
Advanced PKI Topics and Future Trends
- Top 5 deployment issues and lessons learned
- Top 10 risks and recommended mitigation strategies
- Quantum-resistant cryptography and evolving standards
- Zero Trust Architecture and PKI integration
- Future trends in digital identity and trust frameworks
Summary and Next Steps
Requirements
- Familiarity with networking fundamentals
- Basic understanding of cryptography concepts
- General awareness of enterprise security policies
Audience
- CIOs and Chief Security Officers
- Security managers and internal auditors
- IT professionals involved in implementing and securing e-commerce and enterprise systems
21 Hours
Testimonials (1)
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.