- Familiarity with networking fundamentals
- Basic understanding of cryptography concepts
- General awareness of enterprise security policies
Audience
- CIOs and Chief Security Officers
- Security managers and internal auditors
- IT professionals involved in implementing and securing e-commerce and enterprise systems
Public Key Infrastructure (PKI) is a foundational component for securing digital communications, identity, and data integrity across organizations and governments.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT professionals who wish to understand, implement, and manage PKI systems securely and efficiently, including digital certificates, encryption, and CSCA standards.
By the end of this training, participants will be able to:
- Design, deploy, and manage a secure PKI system.
- Evaluate cryptographic techniques and algorithms used in PKI.
- Understand and implement CSCA standards for national and international document security.
- Secure digital communications and storage using PKI-enabled technologies.
Format of the Course
- Interactive lecture and discussion.
- Hands-on lab exercises and simulations.
- Case studies and real-world implementation guidance.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Introduction to PKI
- Basic security concepts and terminology
- Public Key Infrastructure defined
- Digital certificates and signatures
- Smart cards and hardware tokens
- PKI standards and global frameworks
Basic Cryptography
- Uses of cryptography in modern systems
- History of cryptography and evolution of algorithms
- Symmetric vs. asymmetric encryption
- Diffie-Hellman key exchange
- Hashing for data integrity
Practical Uses for Encryption and Associated Issues
- Signed and encrypted email (S/MIME and PGP)
- Secure web connections (HTTPS/SSL)
- Digitally signing PDFs and documents
- File, disk, and container encryption
- VPNs, wireless encryption, and cloud security
- Encryption attacks and mitigation strategies
Certificate Authorities and Certificate Lifecycle
- Public vs. private certificate authorities
- Regulatory compliance and CA policy frameworks
- Types of certificates and their uses
- CA hierarchies and trust chains
- Operations: issuing, renewing, and revoking certificates
- Revocation methods: CRL and OCSP
- Key recovery and certificate templates
- Installing and managing a CA
CSCA Standards and Passport PKI
- Overview of CSCA (Country Signing Certification Authority)
- Use of CSCA in Machine Readable Travel Documents (MRTDs)
- ICAO PKD and global trust frameworks for ePassports
- Implementing a national CSCA hierarchy
- Certificate Master Lists and Document Signer Certificates
- Security, compliance, and international alignment
Advanced PKI Topics and Future Trends
- Top 5 deployment issues and lessons learned
- Top 10 risks and recommended mitigation strategies
- Quantum-resistant cryptography and evolving standards
- Zero Trust Architecture and PKI integration
- Future trends in digital identity and trust frameworks
Summary and Next Steps
United Arab Emirates - PKI: Implement and Manage
Qatar - PKI: Implement and Manage
Egypt - PKI: Implement and Manage
Saudi Arabia - PKI: Implement and Manage
South Africa - PKI: Implement and Manage
Brasil - PKI: Implement and Manage
Canada - PKI: Implement and Manage
中国 - PKI: Implement and Manage
香港 - PKI: Implement and Manage
澳門 - PKI: Implement and Manage
台灣 - PKI: Implement and Manage
USA - PKI: Implement and Manage
Österreich - PKI: Implement and Manage
Schweiz - PKI: Implement and Manage
Deutschland - PKI: Implement and Manage
Czech Republic - PKI: Implement and Manage
Denmark - PKI: Implement and Manage
Estonia - PKI: Implement and Manage
Finland - PKI: Implement and Manage
Greece - PKI: Implement and Manage
Magyarország - PKI: Implement and Manage
Ireland - PKI: Implement and Manage
Luxembourg - PKI: Implement and Manage
Latvia - PKI: Implement and Manage
Italia - PKI: Implement and Manage
Lithuania - PKI: Implement and Manage
Nederland - PKI: Implement and Manage
Norway - PKI: Implement and Manage
Portugal - PKI: Implement and Manage
România - PKI: Implement and Manage
Sverige - PKI: Implement and Manage
Türkiye - PKI: Implement and Manage
Malta - PKI: Implement and Manage
Belgique - PKI: Implement and Manage
France - PKI: Implement and Manage
日本 - PKI: Implement and Manage
Australia - PKI: Implement and Manage
Malaysia - PKI: Implement and Manage
New Zealand - PKI: Implement and Manage
Philippines - PKI: Implement and Manage
Singapore - PKI: Implement and Manage
Thailand - PKI: Implement and Manage
Vietnam - PKI: Implement and Manage
India - PKI: Implement and Manage
Peru - Infraestructura de Clave Pública: Implementar y Administrar (PKI - Public Key Infrastructure)
Polska - PKI: Implement and Manage
United Kingdom - PKI: Implement and Manage
South Korea - PKI: Implement and Manage
Pakistan - PKI: Implement and Manage
Sri Lanka - PKI: Implement and Manage
Bulgaria - PKI: Implement and Manage
Indonesia - PKI: Implement and Manage
Kazakhstan - PKI: Implement and Manage
Moldova - PKI: Implement and Manage
Morocco - PKI: Implement and Manage
Tunisia - PKI: Implement and Manage
Kuwait - PKI: Implement and Manage
Oman - PKI: Implement and Manage
Slovakia - PKI: Implement and Manage
Kenya - PKI: Implement and Manage
Nigeria - PKI: Implement and Manage
Botswana - PKI: Implement and Manage
Slovenia - PKI: Implement and Manage
Croatia - PKI: Implement and Manage
Serbia - PKI: Implement and Manage
Bhutan - PKI: Implement and Manage