A public key infrastructure (PKI) is an effective tool for protecting systems and services on the Internet. Although PKI has been in development for over 20 years, it has only become a hot topic for security managers in the last few years. A major market driver is the new possibilities of digital signatures, which require a PKI.
Public key cryptography is a mature technology that forms the basis for secure protocols. A standard mechanism for the distribution of public keys was not available for a long time. Today, however, progress has been made on both sides. You no longer need to be an expert in public key cryptography to recognize its advantages. There are many different products available on the market today. This course will help you to choose the right option for you and use it successfully.
Day 1: Theory day
1. introduction
2. cryptographic basics
3. authentication
4 PKI basis
5. pki components
6 PKI architectures
7. verification
8. certificate revocation list (CRL)
9. directories
10. x.509 certificates
11. trust, processes, policies
12.applications
Day 2: Practical day
Establishment of a two-tier certification authority environment with a stand-alone offline root certification authority
At the end of the theory section, you will be able to,
After the Public Key Infrastructure practice day, you will be able to set up, correctly configure, manage, secure and troubleshoot all the necessary components of a complete PKI environment.
This course consists of training training and is led by a trainer who supervises the participants live. Theory and practice are taught with live demonstrations and practical exercises. The video conferencing software Zoom is used.
developers and technical architects who want to set up a PKI or create protected applications. Basic knowledge of encryption is an advantage.
Form of learning
Learning form
No filter results
The training is carried out in cooperation with an authorized training partner.
The latter collects and processes data under its own responsibility. Please take note of the corresponding privacy policy