Skip to content

Introduction to PKI

PKI Solutions Introduction to PKI, certificates and keys for Windows and Linux systems.

SKU: PKI003 Category:


All of our training courses are available for private delivery onsite at your organization. For a fixed fee accommodating up to 10 students, our private deliveries enable to you avoid employee travel, out of office issues and provides a schedule that meets your needs. Ask us for details on how to book a delivery.

This comprehensive in-person hands-on training class introduces the concepts and practical functionality of Public Key Infrastructure (PKI) and X.509 Certificates.  It is targeted at those with general, limited, or no PKI knowledge and is ideal for people who need to quickly get up to speed on PKI or fill-in gaps in their existing PKI knowledge. The class provides an extensive description of how PKI works and the practical knowledge that IT staff and developers can apply in their current and future careers.

This class is taught in a live classroom environment with a small number of attendees from different organizations and backgrounds.  The ability to interact and learn with other attendees enhances the overall experience.

This class starts with the fundamentals of PKI and goes in depth to describe the key concepts of PKI such as Certificates, public/private keys, certificate authorities, CA trust, certificate revocation, best practices, and how to launch PKI in your organization.

Class audience: This training class is ideal for System Administrators, IT Engineers, IT Architects, IT Security Staff, Developers/Programmers, DevOps Engineers, or anyone who wants to learn about PKI at a technical and functional level. This class discusses PKI in general, but provides platform specific examples for Linux and Microsoft Windows.  Attendees should have a working knowledge of either Linux or Microsoft Windows.  Attendees with Apple MacOS, HP HP-UX, IBM AIX, or Oracle Solaris backgrounds will also find this class highly useful since much of the Linux specific material can be applied to those environments.

Course details: Download here.


Class Syllabus

  • PKI Explained
    • What is PKI
    • Purposes of PKI
    • Public Key Cryptography
    • History of PKI
    • Why PKI is Important
  • Core Concepts
    • Object Identifier (OID)
    • 500 Distinguished Name (DN)
    • Standard File Encodings
  • Private/Public Key Pairs
    • Overview
    • How Keys Work
    • Creation Process
    • File Formats
    • Tips & Tricks
    • LAB: Public/Private Keys
  • Digital Signatures
    • Functionality
    • Hashing
    • Digital Signature Processes
  • Digital Certificates
    • Introduction
    • Anatomy
      •  Payload
      • Signature
    • Extensions
      • Standard Extensions
      • Key Usage
      • Extended Key Usage
      • Most Common Certificate Types
      • Infrequent Extensions
    • Subject Alternative Names
      • Overview
      • SAN for Computer Subjects
      • Tips & Tricks
      • LAB: Certificate Dissection
    • Standard File Formats
      • PKCS#7
      • PKCS#12
      • Certificate Files on Linux
    • Certificate Summary - Key Concepts
  • PKI Ecosystem
    • Subject Entities (End Entity)
    • Certificate Users (Relying Party)
    • How Certificate Trust Works
    • Certificate Authorities (CA)
      • Overview
      • Issuance Validation
      • CA Hierarchy
      • Commercial/Public CAs
      • Enterprise CAs
    • Certificate Management Systems
  • PKI Processes
    • Certificate Creation
      • Certificate Signing Request (CSR) PKCS#10
      • LAB: Certificate Signing Request
    • The Last Mile Challenge
      • The Challenge
      • Solutions for Linux
      • Solutions for Windows
    • Certificate Renewal
      • How it Works
      • Tips & Tricks
      • LAB: Create Certificate
    • Certificate Revocation
      • What is Revocation
    • Certificate Revocation
      • How it Works
      • Certificate Revocation List (CRL)
      • OCSP
      • Comparison of CRL vs OCSP
      • LAB: Configure Web Servers
    • Time Stamping
      • How it Works
      • Trusted Time Stamping Creation
      • Trusted Time Stamping Validation
  • PKI Best Practices
    • Best Practices for Keys
    • Best Practices for Certificates

You may also like…

Scroll To Top