Certified PKI Expert

PKI is a security architecture that has been introduced to provide an increased level of confidence for exchanging information over an increasingly insecure Internet. A PKI establishes and maintains a trustworthy networking environment by providing key and certificate management services that enable encryption and digital signature capabilities across applications — all in a manner that is transparent and easy to use.

This guide to PKI provides the reader with a basic introduction to key terms and concepts used in a PKI including the use of encryption, digital signatures, public keys, private keys, digital certificates, Certificate Authorities, certificate revocation and storage. It mentions the features and services used by the PKI and the techniques involved in public key cryptography.

This 3-day course which is considered vital for anyone who will be administering a Managed Public Key Infrastructure (PKI) solution, covering the issues and technologies involved in PKI in depth. The course gives hands-on practical experience of setting up and maintaining a Public Key Infrastructure (PKI) solution

Course Content

PKI Defined
Security Model
Certification Architecture
Technology Views

The House of Security
Security policies
Privacy and Confidentiality
The Challenge

Introduction and terms used
Symmetric Encryption
Diffie-Hellman Key Generation
Asymmetric Encryption
Signed and Encrypted Email

The Need for Digital Signatures
Digital Signatures in Detail
Applications of Digital Signatures
Electronic or Digital Signature
Digital Signature and Digital Certificate

Need for Digital Certificates
What is a Digital Certificate
Certificate Types
Public Key Distribution in Certificates
Obtaining a Personal Certificate

Public Key Infrastructure
Certificate Policies
Certificate Classification
Certificate Authority Hierarchy
Certificate Authority Operations

Key Recovery Authority
Validation and OCSP
SSL, VPN and Wireless
Smart Cards
Roaming Solutions

Request Call Back