Search

Seminars

Implementing & Managing Public Key Infrastructure PKI



Introduction:


This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used. After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI). This course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organization. Throughout the whole course, participants will gain in-depth knowledge on the following topics:

 

  • Legal aspects of a PKI
  • Elements of a PKI
  • PKI management
  • Trust in a digital world
  • Digital signature implementation
  • Trust models

Course Objectives:


By the end of this course, delegates will be able to:

 

  • Be introduced to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities
  • Have hands on experience of implementing and using PKI solutions with a variety of applications
  • Gain an understanding of the concepts of evaluating and selecting PKI technologies

Who Should Attend?


IT Engineers, IT Professionals, IT Directors, Engineers, IT Project Managers, IT Auditors, IT Compliance Managers, IT Coordinators, IT Support Managers, IT Officers, IT Support Specialists, IT System Administration, Technical Support Professionals, Chief Information Officers, Chief Risk Officers, Information Assurance Officers, Program Managers, Network Systems Analysts, Government Program Managers, R&D Project Managers, Software and System Developers, Chief Security Officers, Security Specialists, Chief Information Security Officers, Directors of Security, Security Architects, Security Operation Center Managers, Security Consultants, Security Managers, Security Auditors, Security Directors, Systems Administrators, Incident Response Analysts, Business Owners, Security Analysts, Security Systems Engineer, Network Architect, Operations Managers, Risk Management Professionals, Network Administration Professionals, Application Developers, Application Support Analysts, Application Engineers, Associate Developers, Technology Officers, Information Officers, Help Desk Specialist, Help Desk Technician, Database Administrators, Network Architects, Network Engineers, Network System Administrators, System Analysts, System Architects, System Designers, Anyone involved in Public Key Infrastructure, PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors

Course Outline:


Introduction to PKI

  • Basic Security Concepts
  • Public Key Infrastructure Defined
  • Digital Certificates and Signatures
  • Smart Cards
  • PKI Standards

 

Basic Cryptography

  • Uses of Cryptography
  • History of Cryptography including early methods
  • Symmetric and Asymmetric Encryption plus Algorithms
  • Diffie-Hellman Key Generation
  • Hashing for Integrity plus Algorithms

 

Practical Uses for Encryption and Associated Issues

  • Signed and Encrypted Email using S/MIME and PGP
  • Secure connections to websites
  • Digitally signing PDFs
  • Encrypting files
  • Encrypting hard drives
  • Encrypting “containers”
  • SSL, VPN and Wireless
  • PKI and Cloud Computing
  • Attacks on Encryption

 

Certificate Authorities

  • Public v Private CAs
  • Regulations governing CAs
  • CA Certificate Policies
  • Types of Certificates Provided
  • CA Hierarchies
  • Certificate Authority Operations
  • Certificate expiration
  • Certificate revocation
  • Certificate Revocation Lists (CRL)
  • Online Certificate Status Protocol (OCSP)
  • Key recovery
  • Installing a CA and issuing certificates
  • Certificate Templates

 

Summary

  • Top 5 Deployment Issues
  • Top 10 Risks
  • Advanced PKI Topics and Futures
  • Summary of Public Key Infrastructure

COURSE LOCATIONS

Code From To City Fee
IT31 26 Jan 2020 30 Jan 2020 Doha US$ 4000 Book
IT31 16 Mar 2020 20 Mar 2020 Madrid US$ 5500 Book
IT31 24 May 2020 28 May 2020 Dubai US$ 4200 Book
IT31 13 Jul 2020 17 Jul 2020 Geneva US$ 6000 Book
IT31 21 Sep 2020 25 Sep 2020 Rome US$ 5500 Book
IT31 09 Nov 2020 13 Nov 2020 Manila US$ 5500 Book


DUBAI OFFICE

Ittihad Deira Building,
Al Ittihad Rd, Deira
Dubai,
UAE

info@petrogas-training.com

USA OFFICE

642 E14 Street,
10009-13 Manhattan,
New York (NY)
USA

info@petrogas-training.com

EGYPT OFFICE

52 General Kamal Hejab Street,
Suez Bridge,
Cairo,
Egypt

info@petrogas-training.com
 

COURSE CERTIFICATE

Certificate of Completion will be provided to the candidate(s) who successfully attend and complete the course. Training hours attendance percentage of 75% is required.


TRAINING HOURS

Standard course hours: 8:30 A.M. to 3:30 P.M. Informal discussions: 4:30 P.M. to 5:30 P.M.


TRAINING METHODOLOGY

We use a blend of interactive and hands-on methods, active participation, a variety of instructional techniques, dynamic presentations, individual and group exercises, in depth discussion, DVD’s, role-plays, case studies, examples. All of the information, competencies, knowledge and skills acquired within our training programs, are 100% transferrable to the participants’ workplace.


ASSESSMENT & EVALUATION

Pre-Test and Post-Test Assessment are applied on 5-day and 10-day programs. Also, post course evaluation and candidate’s evaluation are applied to add another level of quality measurement. Candidates’ feedback is highly appreciated to elevate the training service quality.


ORGANIZATIONAL IMPACT

A- Have staff trained in the latest training and development approaches

B- Support nationalization and talent management initiatives

C- Have properly trained and informed people who will be able to add value

D- Gain relevant technical knowledge, skills and competencies


PERSONAL IMPACT

A- Develop job related skills

B- Develop personal skills in subject matter

C- Have a record of your growth and learning results

D- Bring proof of your progress back to your organization

F- Become competent, effective and productive

G- Be more able to make sound decisions

H- Be more effective in day to day work by mastering job-related processes

I- Create and develop competency to perform job well


FREQUENT NOMINATIONS SCHEME

A- 10% discount after 05 candidates’ registration.

B- 15% discount after 10 candidates’ registration.    

C- 20% discount after 20 candidates’ registration.

D- 25% discount after 25 candidates’ registration.

E- 30% discount after 30 candidates’ registration

F- Higher discount rates will be offered based on work volume with different clients.  


SEVERAL NOMINATIONS ON THE SAME COURSE SCHEME

A- One extra free seat is offered on 4 candidates on the same course and dates.

B- Two extra free seats are offered on 6 candidates on the same course and dates.

C- Three extra free seats are offered on 8 candidates on the same course and dates.

D- Four extra free seats are offered on 10 candidates on the same course and dates.

E- Five extra free seats are offered on 12 candidates on the same course and dates.


REGISTRATION POLICY

Nominations to our public courses are to be processed by the client’s Training and/or HR departments. A refund will be issued back to the client in the event of course cancellation or seat unavailability. A confirmation will be issued to the relevant department official(s). 


CANCELLATION POLICY

If a confirmed registration is cancelled less than 5 working days prior to the course start date, a substitute participant may be nominated to attend the same course or a 20% cancellation charge is applied. In case of a no-show, a 100% fee will be charged.


PAYMENT POLICY

Payment is due upon receiving the course confirmation, invoice and/or proforma invoice. However; the fee due can be wire transferred to our bank account directly after course completion. Our bank details are illustrated on the confirmation, invoice and proforma invoice, as well. The above documents can be communicated electronically, i.e., in a soft copy or/and in hard copy based on customer’s request.


COPYRIGHT

© 2017. Material published by PETROGAS shown here is copyrighted. © 2017. All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing in any medium, transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.