IEEE.org  |  IEEE Xplore Digital Library  |  IEEE Standards  |  IEEE Spectrum  |  More Sites

Course Details

Cyber Security
Public Key Infrastructure – PKI
Teacher

Self Paced

Last Update:

September 7, 2023

Review:
0(0)
concept of cyber security or private key

About Course

This course aims to equip participants with a thorough understanding of Public Key Infrastructure (PKI) and its vital role in safeguarding digital communications. By delving into various aspects of cryptography, digital certificates, and cyber hygiene, participants will gain the knowledge and skills necessary to protect sensitive data and mitigate cyber threats effectively.

 

What Will You Learn?

  • To Explore a meticulously designed curriculum spanning Cyber Hygiene, Cryptography, AES and PKI Algorithms, Digital Signatures, PKCS standards, OSCP certification, SSL, eSign, and Authentication Protocols, ensuring a holistic grasp of PKI concepts and their practical applications.
  • To Acquire valuable insights into cutting-edge encryption techniques, digital signature verification, and authentication protocols that are in high demand across industries, enhancing your professional profile and employability.
  • Understand the legal and regulatory frameworks underpinning cybersecurity, enabling you to navigate complex compliance requirements and protect sensitive data with confidence.
  • To learn the essentials of penetration testing and enhancing your ability to identify and address vulnerabilities.
  • To learn the art of securing digital communications, equipping yourself with the expertise to safeguard information, prevent cyber-attacks, and respond effectively to threats.
  • Develop a holistic comprehension of PKI, encryption algorithms, digital signatures, and authentication protocols, enabling you to make informed decisions and contribute effectively to your organization's cybersecurity strategy.
  • To elevate your career prospects by acquiring specialized skills that are highly sought-after in the cybersecurity landscape, positioning yourself for roles such as security analyst, encryption specialist, or a penetration tester.
  • Gain the knowledge to ensure your organization's compliance with cyber hygiene regulations and legal requirements, strengthening your ability to protect sensitive data and uphold privacy standards.

Course Content

Cyber Hygiene with Law

  • Internet, Cyber Security and Surface/Deep/Dark Web
  • Cyber Crimes and it’s types
  • Identity theft
  • Password attacks
  • Mobile Security
  • Social Engineering
  • Phishing, Vishing and Smishing

Cryptography and PKI Algorithm

AES and PKI Algorithms

Digital Signatures

PKCS Standards

OSCP

SSL

eSign

Authentication Protocols

FAQ

How do I get a receipt after purchasing a course?

I purchased a course on the platform. How do I start accessing the e-Learning?

I am a faculty at a college and would like to enroll my students for the IEEE Blended Learning Program. How do I do this?

How long do I have access to the courses after successful enrollment (token number accepted by the platform)?

How can I extend access to the e-Learning course beyond the end date?

I purchased and enrolled into a course but I am not able to continue. Can I get a refund?

Where can I find instructions to navigate e-Learning?

I entered my course token and the platform shows that my token number is invalid.

I just enrolled to a course. How do I begin e-Learning ?

How do I access all the courses I have purchased/enrolled for?

Can I download courses and complete them at my leisure?

Can I print/download course material?

The e-Learning has suddenly become unresponsive. How can I restart the program without losing data?

Will my assessment results be saved if the Internet connection is lost during the session?

What happens when there is power interruption or the Internet connection is lost in the middle of the course?

I cannot listen to the audio/there is inconsistency and drag in the audio. How can I fix this issue?

The audio is too fast/slow for me. I am unable to listen to all concepts in one take. How can I fix this issue?

How can I communicate feedback about the IEEE Blended Learning Program?

I am having several technical issues while browsing the e-Learning. Whom do I contact?

Why is the Course Feedback link not enabled in my Course Details page?

I have completed the program but unable to download the certificate.

5,499.00 6,600.00
  • Instructor
    Self Paced
  • Language
    English

Payment :

img

Material Includes

  • E-Learning
  • Quizzes
  • Final Assessment

Requirements

  • No prior knowledge of cybersecurity fundamentals required but the participant should have basic familiarity using computers, internet and various digital devices.
  • Anyone with computer networks knowledge would be helpful, but not mandatory
  • Cybersecurity enthusiast with linux knowledge would be helpful, but not mandatory

Audience

  • Beginners who are looking to get started with cybersecurity industry.
  • Aspiring cybersecurity professionals.
  • Those who are looking to gain skills to assume entry-level positions in security operations (Security analyst/ Jr. Engineer)
  • Students who want to techniques on how to protect their privacy online and safeguard their digital assets
X