loader image

Empire Training

Cyber Security - Public Key Infrastructure

Is a cryptographic key management system, which enables the issuance, distribution and verification of digital certificates to secure communications and authenticate users online.

Flexible 100% online training

Start your new career at any time! Available part-time? No problem, study at your own pace.

Professional projects

You will develop your professional skills by working on concrete projects inspired by business reality. No problem, study at your own pace.

Personalized support

Benefit from weekly mentoring sessions with a business expert.

image (69)

Earn certificates and diplomas

Earning certificates and degrees can enhance your career, broaden your horizons, and provide you with increased personal satisfaction.

Training Objectives: Public Key Infrastructure

Educational objectives: 

Know how to master PKI principles and implementation.

Educational objectives: 

At the end of PKI training you will have acquired the knowledge and skills necessary to:

  • Technologies and standards (coarse-grained cryptography)
  • Implementations: architectures, integration issues (organization of a PKI, certificate format, sticking points)
  • Organizational aspects and certifications
  • Legal requirements: electronic signature, recovery keys, use, export / international use
  • The three types of tools on the market: the Microsoft Certificate Server offering, the IDNomic commercial offerings and the Open Source offering (EJBCA).

Who is this training for?

Audience :

This training is aimed at Architects, Project Managers, Security Managers/RSSIs with a technical orientation, Senior Developers, Senior System and Network Administrators. 

Prerequisites:

To follow this course optimally, you must have initial training or proven experience in IT, such as knowing how to launch a command line, having notions of API and knowing how IP networks work.

A pedagogy based on practice

  • Acquire essential skills by validating professional projects.
  • Progress with the help of a professional expert.
  • Gain real know-how as well as a portfolio to demonstrate it.

PKI Course Content:

Technique and cryptography:

Cryptographic primitives synthesisGeneral framework: History, Definitions
Mechanisms: Encryption, condensate, MAC, Modes
Common assemblies: signature, symmetrical & asymmetrical combination, session key, IV
Cryptographic attacks: from brute force to quantum cryptanalysis
System attacks: “side channel”, “man in the middle”, attacks on key management
Secrets Management: HSM Key Management, Software Containers
ANSSI/NIST/ECRYPT Recommendations
The need for PKI 

Architecture and integration:

PKI-X Architecture: CA/Sub-CA/RA
Common architectures: concrete variations of roles
Defining a certification policy and a security policy
Implementation details: Key generation and certificate issuance, revocation, key dissemination
PKI typology: Internal for dedicated use Internal transversal External dedicated (PKI As A Service) External shared (Certificate As A Service), embedded PKI
Organizational Aspects: Key processes, control.
Certification: ETSI requirements: 102042, 101456, 102023 RGS, PSC requirements

Managing a PKI project

Pre-studies:
– Summary of the need
– Definition of the technical infrastructure
– Definition of the organizational component
Framing workshop
– Conducting a framing workshop
– Framing support
Functional specifications
– Expressions of needs
– Functional specifications
Studies of solutions and comparisons
– Microsoft (ADCS)
– Open (EJBCA)
– Commercial (IDNomic)

Implementing a PKI:

Presentation of an Open Source solution, EJBCA
Introducing a commercial solution, IDNomic
Microsoft Certificate Services Overview
Product Architecture Overview
Demonstration of common use:
– Setting up and configuring the Root CA
– Setup and configuration of the RA
– Implementation of the trust model – Key generation
– Certificate, Certificate Options
– Revocation, publication
Token generation

Legal aspects and perspectives:

Legal aspectsElectronic signature: legal value, framework…
Usage regulations: limitations, escrow (trusted third party), export
International use.

Individual and privileged supervision.
The Empire Training community

Online pre-registration

Please fill out the form

Please fill out the form

Please enable JavaScript in your browser to complete this form.

Cyber security pre-registration

Experience
Training format
Need for training
Click or drag a file into this area to upload it.

How does an Empire Training course work?

From the chosen training to their entry into their new career, our students recount each stage of their experience and the support they received.

WhatsApp
Send via WhatsApp
Custom Cursor Image