A public key infrastructure (PKI) is an effective tool for protecting systems and services on the internet. Although PKI has been in development for over 20 years, it is only in the last few years that it has become a topic of discussion among security managers. A major market driver are the new possibilities of digital signatures, which require a PKI.
Public-key cryptography is a mature technology that forms the basis for secure protocols. A standard mechanism for the distribution of public keys was not available for a long time. Today, however, progress has been made on both sides. You no longer need to be an expert in public-key cryptography to recognise its advantages. Because today, a wide variety of products are available on the market. This course will help you to choose the right ones for you from the many possibilities and to use them successfully.
Day 1: Theory day
1 Introduction
2 Cryptographic basics
3 Authentication
4 PKI-based
5 PKI components
6 PKI architectures
7 Verification
8 Certificate Revocation List (CRL)
9 Directories
10 X.509 certificates
11 Trust, procedures, policies
12 Applications
Day 2: Practical day
Setting up a two-tier certification authority environment with a stand-alone offline root certification authority
This seminar is designed for two course days. On the first day, you will learn the theoretical basics of PKI. The second day is a purely practical day, where the basics learned on the first day are put into practice.
This course is aimed at developers and technical architects who want to build a PKI or produce protected applications.
Basic knowledge of encryption is an advantage.