

Public-key infrastructures (PKI) form the foundation for trusted digital communication. Digital certificates enable the reliable authentication of systems, services, and users, as well as the encryption and signing of data—both on the internet and within corporate networks.
In this PKI course, you will gain the knowledge needed to understand, plan, and securely operate PKI environments. You will learn the basics of encryption, digital signatures, and certificates, and discover how public key infrastructures are used in modern IT environments.
Through hands-on setup of a multi-tier Microsoft PKI environment, you will work with certification authorities (CAs), certificates, and related services. By the end of the Public Key Infrastructure course, you will be able to plan, implement, and reliably operate a PKI in your own environment.
Day 1
1. Introduction:
2. Cryptographic Fundamentals:
3. Authentication:
4. PKI Foundation:
5. PKI components:
6. PKI Architectures:
7. Verification:
8. certificate revocation list (CRL)
9. Directories:
10. X.509 certificates:
11. Trust, Procedures, Policies:
12. Applications:
13. Requesting Certificates:
Day 2: Practical day
Implementation of a two-tier certification authority (CA), comprising:
Requirements:
A basic understanding of encryption is helpful.
On the first day, you'll learn the theoretical basics of Public Key Infrastructure (PKI).
The second day is structured as a workshop. Here, you can put the knowledge you’ve gained to the test in a practical setting.
This PKI course is designed for system administrators, developers, security professionals, and IT architects who want to plan, implement, or operate secure applications using digital certificates.
The Public Key Infrastructure course is particularly appealing to:
Form of learning
Learning form
No filter results
The training is carried out in cooperation with an authorized training partner.
The latter collects and processes data under its own responsibility. Please take note of the corresponding privacy policy
