PKI & TLS Security Implementation

DATE

Duration

LOCATION

FEES

Book Now

27 May
- 31 May 2024

5 Days

Dubai

$4,250

4 Nov
- 8 Nov 2024

5 Days

Dubai

$4,250

18 Feb
- 22 Feb 2024

5 Days

Virtual Online

$3,450

12 Aug
- 16 Aug 2024

5 Days

Virtual Online

$3,450

This course cover the basics of PKI, the basics of encryption, the Encrypting File System currently used by Windows 7 and Windows 8, the creation of a PKI using a variety of software and looking at tools which can exploit flaws in the implementation of a PKI.

By the end of the course, you‘ll be able to:

  • Understand what is PKI
  • Know the PKI Components
  • Know how PKI works
  • Understand data encryption and integrity
  • Understand how to protect a PKI deployment

This course is made for :

  • Systems Engineers
  • Network Administrators
  • IT professionals
  • Security Consultants
  • Infrastructure Architects
  • Security Professionals
  • Other people responsible for implementing network and perimeter security, Chief Security Officer

Day One

Basics of Cryptography

  • CIA Triad
  • History of cryptography
  • Real world application of cryptography
  • Block and Stream Ciphers
  • Symmetric encryption
  • Symmetric encryption algorithms
  • Asymmetric encryption
  • Cryptographic Signatures
  • hashing Algorithms
  • Windows password analysis

Day Two

Introduction to Public Key Infrastructure

  • Definition and PKI components
  • 509 certificates
  • Certificate Signatures
  • Public Key Cryptography Standards (PKCS)

Day Three

Disc Encryption

  • Disc Encryption technologies
  • Encrypting File System
  • Bit Locker
  • Trusted Platform Modules
  • Attacking Disc Encryption
  • Investigating the Encryption File System: Encrypting and decrypting files with bit locker

Day Four

Installing Certificate Authority Hierarchy

  • Certificate of Authority (CA)
  • Types of Certification Authority
  • CA Hierarchy Design Guidelines
  • Root Certificate Authority
  • Analysis of problems with CA
  • Certification revocation
  • Installing an Offline Root Certification Authority
  • installing and Issuing Certificate Authority
  • Administering certificate templates
  • installing an online responder

Day Five

Transport Layer Security (TLS)

  • Securing Web sites
  • TLS traffic analysis (Wireshark)
  • Creating a TLS-enabled Web Site
  • Analyzing TLS Traffic
  • Revoking a certificate
Training Subject
Training Location