Kursplan
Introduction to Encryption and Key Management
- Symmetric vs asymmetric encryption
- Key usage in data encryption and authentication
- Why key management matters for security and compliance
Key Lifecycle Management
- Key generation and distribution
- Key rotation and expiration
- Key archival and secure deletion
Access Control and Key Protection
- Role-based access to key operations
- Separation of duties and audit trails
- Hardware Security Modules (HSMs)
Key Management Systems and Architectures
- Overview of commercial and open-source KMS
- Architecture for secure key storage and management
- Integrating KMS with applications and services
Cloud Key Management Practices
- Key management in AWS, Azure, and Google Cloud
- Bring Your Own Key (BYOK) vs Cloud-native keys
- Multi-cloud key management strategies
Compliance and Auditing
- Key management in PCI DSS, HIPAA, GDPR, and NIST
- Auditing key usage and implementing alerting
- Incident response for compromised keys
Case Studies and Best Practices
- Enterprise-scale key management deployment
- Common pitfalls and mitigation strategies
- Designing your organization’s key management policy
Summary and Next Steps
Krav
- Understanding of basic encryption and cryptography concepts
- Experience working with IT infrastructure or security systems
- Familiarity with cloud environments is helpful
Audience
- Security engineers
- IT administrators managing sensitive data
- Compliance and risk professionals
Testimonials (5)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Kurs - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Kurs - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Kurs - HIPAA Compliance for Developers
I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri
Kurs - CISM - Certified Information Security Manager
I genuinely enjoyed the real examples of the trainer.