PKI & TLS Security Implementation

3 Day Course
Hands On

This course has been retired. Please view currently available Cyber Security Training Courses.


Collapse all

Basics of Cryptography (10 topics)

  • CIA Triad
  • History of cryptography
  • Real world application of cryptography
  • Block and Stream Ciphers
  • Symmetric encryption
  • Symmetric encryption algorithms
  • Asymmetric encryption
  • Cryptographic Signatures
  • hashing Algorithms
  • Windows password analysis

Introduction to Public Key Infrastructure (PKI) (4 topics)

  • Definition and PKI components
  • X.509 certificates
  • Certificate Signatures
  • Public Key Cryptography Standards (PKCS)

Disc Encryption (6 topics)

  • Disc Encryption technologies
  • Encrypting File System
  • BitLocker
  • Trusted Platform Modules
  • Attacking Disc Encryption
  • Investigating the Encryption File System: Encrypting and decrypting files with bitlocker

Installing Certificate Authority Hierarchy (10 topics)

  • Certificate of Authority (CA)
  • Types of Certification Authority
  • CA Hierarchy Design Guidelines
  • Root Certificate Authority
  • Analysis of problems with CA
  • Certification revocation
  • Installing an Offline Root Certification Authority
  • Installing and Issuing Certificate Authority
  • Administering certificate templates
  • installing an online responder

Transport Layer Security (TLS) (5 topics)

  • Securing Web sites
  • TLS traffic analysis (Wireshark)
  • Creating a TLS-enabled Web Site
  • Analysing TLS Traffic
  • Revoking a certificate


The prerequisites for this workshop are attendance of the Information Security Fundamentals course, or equivalent knowledge.

Course PDF