Course Code: pkiimpman
Duration: 21 hours
Prerequisites:

  • Familiarity with networking fundamentals
  • Basic understanding of cryptography concepts
  • General awareness of enterprise security policies

Audience

  • CIOs and Chief Security Officers
  • Security managers and internal auditors
  • IT professionals involved in implementing and securing e-commerce and enterprise systems

Overview:

Public Key Infrastructure (PKI) is a foundational component for securing digital communications, identity, and data integrity across organizations and governments.

This instructor-led, live training (online or onsite) is aimed at advanced-level IT professionals who wish to understand, implement, and manage PKI systems securely and efficiently, including digital certificates, encryption, and CSCA standards.

By the end of this training, participants will be able to:

  • Design, deploy, and manage a secure PKI system.
  • Evaluate cryptographic techniques and algorithms used in PKI.
  • Understand and implement CSCA standards for national and international document security.
  • Secure digital communications and storage using PKI-enabled technologies.

Format of the Course

  • Interactive lecture and discussion.
  • Hands-on lab exercises and simulations.
  • Case studies and real-world implementation guidance.

Course Customization Options

  • To request a customized training for this course, please contact us to arrange.

Course Outline:

Introduction to PKI

  • Basic security concepts and terminology
  • Public Key Infrastructure defined
  • Digital certificates and signatures
  • Smart cards and hardware tokens
  • PKI standards and global frameworks

Basic Cryptography

  • Uses of cryptography in modern systems
  • History of cryptography and evolution of algorithms
  • Symmetric vs. asymmetric encryption
  • Diffie-Hellman key exchange
  • Hashing for data integrity

Practical Uses for Encryption and Associated Issues

  • Signed and encrypted email (S/MIME and PGP)
  • Secure web connections (HTTPS/SSL)
  • Digitally signing PDFs and documents
  • File, disk, and container encryption
  • VPNs, wireless encryption, and cloud security
  • Encryption attacks and mitigation strategies

Certificate Authorities and Certificate Lifecycle

  • Public vs. private certificate authorities
  • Regulatory compliance and CA policy frameworks
  • Types of certificates and their uses
  • CA hierarchies and trust chains
  • Operations: issuing, renewing, and revoking certificates
  • Revocation methods: CRL and OCSP
  • Key recovery and certificate templates
  • Installing and managing a CA

CSCA Standards and Passport PKI

  • Overview of CSCA (Country Signing Certification Authority)
  • Use of CSCA in Machine Readable Travel Documents (MRTDs)
  • ICAO PKD and global trust frameworks for ePassports
  • Implementing a national CSCA hierarchy
  • Certificate Master Lists and Document Signer Certificates
  • Security, compliance, and international alignment

Advanced PKI Topics and Future Trends

  • Top 5 deployment issues and lessons learned
  • Top 10 risks and recommended mitigation strategies
  • Quantum-resistant cryptography and evolving standards
  • Zero Trust Architecture and PKI integration
  • Future trends in digital identity and trust frameworks

Summary and Next Steps

Overview in Category:

This instructor-led, live training in <loc> (online or onsite) is aimed at advanced-level IT professionals who wish to understand, implement, and manage PKI systems securely and efficiently, including digital certificates, encryption, and CSCA standards.

By the end of this training, participants will be able to:

  • Design, deploy, and manage a secure PKI system.
  • Evaluate cryptographic techniques and algorithms used in PKI.
  • Understand and implement CSCA standards for national and international document security.
  • Secure digital communications and storage using PKI-enabled technologies.