Course Outline
Introduction to PKI
- Basic security concepts and terminology
- Public Key Infrastructure defined
- Digital certificates and signatures
- Smart cards and hardware tokens
- PKI standards and global frameworks
Basic Cryptography
- Uses of cryptography in modern systems
- History of cryptography and evolution of algorithms
- Symmetric vs. asymmetric encryption
- Diffie-Hellman key exchange
- Hashing for data integrity
Practical Uses for Encryption and Associated Issues
- Signed and encrypted email (S/MIME and PGP)
- Secure web connections (HTTPS/SSL)
- Digitally signing PDFs and documents
- File, disk, and container encryption
- VPNs, wireless encryption, and cloud security
- Encryption attacks and mitigation strategies
Certificate Authorities and Certificate Lifecycle
- Public vs. private certificate authorities
- Regulatory compliance and CA policy frameworks
- Types of certificates and their uses
- CA hierarchies and trust chains
- Operations: issuing, renewing, and revoking certificates
- Revocation methods: CRL and OCSP
- Key recovery and certificate templates
- Installing and managing a CA
CSCA Standards and Passport PKI
- Overview of CSCA (Country Signing Certification Authority)
- Use of CSCA in Machine Readable Travel Documents (MRTDs)
- ICAO PKD and global trust frameworks for ePassports
- Implementing a national CSCA hierarchy
- Certificate Master Lists and Document Signer Certificates
- Security, compliance, and international alignment
Advanced PKI Topics and Future Trends
- Top 5 deployment issues and lessons learned
- Top 10 risks and recommended mitigation strategies
- Quantum-resistant cryptography and evolving standards
- Zero Trust Architecture and PKI integration
- Future trends in digital identity and trust frameworks
Summary and Next Steps
Requirements
- Familiarity with networking fundamentals
- Basic understanding of cryptography concepts
- General awareness of enterprise security policies
Audience
- CIOs and Chief Security Officers
- Security managers and internal auditors
- IT professionals involved in implementing and securing e-commerce and enterprise systems
Testimonials (3)
In accordance with the instructor's teaching style
Juan Carlos Barranco Camargo - GSE
Course - PKI: Implement and Manage
Machine Translated
Explanation of algorithms and how to identify the most appropriate ones
Gabriel Diaz Leon - GSE
Course - PKI: Implement and Manage
Machine Translated
The trainer always ensured me fully understand what he had taught and do not hesitate to repeat again if I am still not clear about it. He is committed to preparing more samples to show me to answer the extra questions from me.