PKI & TLS Security Implementation
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
This course cover the basics of PKI, the basics of encryption, the Encrypting File System currently used by Windows 7 and Windows 8, the creation of a PKI using a variety of software and looking at tools which can exploit flaws in the implementation of a PKI.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Understand what is PKI
- Know the PKI Components
- Know how PKI works
- Understand data encryption and integrity
- Understand how to protect a PKI deployment
-
COURSE AUDIENCE
This course is made for :
- Systems Engineers
- Network Administrators
- IT professionals
- Security Consultants
- Infrastructure Architects
- Security Professionals
- Other people responsible for implementing network and perimeter security, Chief Security Officer
-
COURSE OUTLINE
Day One
Basics of Cryptography
- CIA Triad
- History of cryptography
- Real world application of cryptography
- Block and Stream Ciphers
- Symmetric encryption
- Symmetric encryption algorithms
- Asymmetric encryption
- Cryptographic Signatures
- hashing Algorithms
- Windows password analysis
Day Two
Introduction to Public Key Infrastructure
- Definition and PKI components
- 509 certificates
- Certificate Signatures
- Public Key Cryptography Standards (PKCS)
Day Three
Disc Encryption
- Disc Encryption technologies
- Encrypting File System
- Bit Locker
- Trusted Platform Modules
- Attacking Disc Encryption
- Investigating the Encryption File System: Encrypting and decrypting files with bit locker
Day Four
Installing Certificate Authority Hierarchy
- Certificate of Authority (CA)
- Types of Certification Authority
- CA Hierarchy Design Guidelines
- Root Certificate Authority
- Analysis of problems with CA
- Certification revocation
- Installing an Offline Root Certification Authority
- installing and Issuing Certificate Authority
- Administering certificate templates
- installing an online responder
Day Five
Transport Layer Security (TLS)
- Securing Web sites
- TLS traffic analysis (Wireshark)
- Creating a TLS-enabled Web Site
- Analyzing TLS Traffic
- Revoking a certificate
Keyword
Training Subject
Training Location