PDF Add to WishList
In this training course, you gain essential skills for designing, creating, and maintaining a Public Key Infrastructure (PKI), and learn how to leverage PKI to provide authentication and encryption for applications, examine symmetric and asymmetric cryptography and digital signatures, and manage hierarchical Certification Authorities (CAs) and X.509 digital certificates.
Course Tuition Includes:
After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.
After-Course Computing Sandbox
You'll be given remote access to a preconfigured virtual machine for you to redo your hands-on exercises, develop/test new code, and experiment with the same software used in your course.
Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm