0345 4506120

PKI & TLS Security Implementation

Recent attacks against individuals and companies online have utilised known vulnerabilities in certificate management in order to spoof websites or gain trust to install malicious software without the user's knowledge. This 3 day workshop provides an opportunity for industry, research and academia communities, and government sectors, to have a broad overview of the use of encryption technology in Public Key Infrastructure and Transport Layer Security. This includes an analysis of the most prolific attacks against crypto systems.

This instructor-led event will combine lectures on the basics of encryption, the Encrypting File System currently used by Windows 7 and Windows 8, the creation of a PKI using a variety of software and looking at tools which can exploit flaws in the implementation of a PKI. The lectures will be complemented with extensive exercises using the software discussed.

Target Audience:

The course is intended for anyone who wishes to develop an understanding of the concepts behind public key infrastructure, transport layer security and their application in real life.

We don't currently have any courses listed for PKI & TLS Security Implementation , would you like to view all courses for Information & Cyber Security?

Learning Objectives

At the end of the workshop, delegate will have a good understanding of the fundamentals of cryptography and the concept of Public Key Infrastructure. Delegate will gain practical experience in Encryption File System, Web page encryption, Certificate Authority creation and configuration, and Certificate revocation. The practical exercises are used to consolidate the theory discussed throughout the workshop.


  • The prerequisites for this workshop are attendance to a Security Fundamentals course or to have equivalent knowledge.

Course Content

Module 1: Basics of Cryptography

This module introduces the fundamentals concepts of cryptography. The following point will be covered in this first module:

  • CIA Triad
  • History of cryptography
  • Real world application of cryptography
  • Block and Stream Ciphers
  • Symmetric encryption
  • Symmetric encryption algorithms
  • Asymmetric encryption
  • Cryptographic Signatures
  • hashing Algorithms
  • Windows password analysis

Module 2: Introduction to Public Key Infrastructure (PKI)

Building from the understanding of cryptographic fundamental concepts, the Public Key Infrastructure will be introduced. The following points will be covered:

  • Definition and PKI components
  • X.509 certificates
  • Certificate Signatures
  • Public Key Cryptography Standards (PKCS)

Module 3: Disc Encryption

A practical use of encryption will be explored. Key management concepts will also be introduced.

  • Disc Encryption technologies
  • Encrypting File System
  • BitLocker
  • Trusted Platform Modules
  • Attacking Disc Encryption
  • Investigating the Encryption File System: Encrypting and decrypting files with bitlocker 

Module 4: Installing Certificate Authority Hierarchy

In this module, Certificate of Authority will be further explored. The following points will be covered:

  • Certificate of Authority (CA)
  • Types of Certification Authority
  • CA Hierarchy Design Guidelines
  • Root Certificate Authority
  • Analysis of problems with CA
  • Certification revocation
  • Installing an Offline Root Certification Authority
  • Installing and Issuing Certificate Authority
  • Administering certificate templates
  • installing an online responder

Module 5: Transport Layer Security (TLS)

Securing website from unsolicited monitoring is essential to ensure the confidentiality of data that transit through the web. TLS will be explored in great details in this module and the following points will be covered:

  • Securing Web sites
  • TLS traffic analysis (Wireshark)
  • Creating a TLS-enabled Web Site
  • Analysing TLS Traffic
  • Revoking a certificate

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include