Internet PKI in Depth
Spend a full day to understand both
the theory and practice of Internet PKI
Based on the book Bulletproof SSL and TLS. We’ll
start with the basics and the theory,
then discuss how the PKI is implemented in the real world, and finish with a practical example
of a realistic private certification authority. You will learn methods which you can easily replicate in
your own work.
We prefer small class sizes and never overbook. This course is also available as an on-site
Why This Course is for You
- Learn about key PKI standards and formats
- Understand where practice differs from theory
- Analyze certificate lifecycle in detail
- Evaluate PKI weaknesses and how they affect you
- Deploy robust protection using public key pinning
- Learn about what's coming in the future
- Practise what you've learned
By the end of the day you will have built a fully-functioning private CA—with multiple
intermediate CAs and revocation—using a method that you can easily replicate.
- X.509 certificates
- Certificate chains
- Name constraints
- Trust path building
- Validation process
- Internet PKI
- Certification Authorities
- Relying parties
- Certificate types (DV, EV, OV)
- Certificate lifecycle (validation, issuance, and revocation)
- CA/B Forum and its standards
- History of attacks
- OCSP stapling
- CRLsets and OneCRL
- Short-lived certificates
- Certification Authority Authorization (CAA)
- Public Key Pinning
- Static pinning
- Certificate Transparency
- PKI ecosystem monitoring
- SSL Pulse
- Project: Building and deploying a realistic private CA
CodeNode, 10 South Place, London, EC2M 7EB
Lunch and refreshments included
Free Book: Bulletproof SSL and TLS
About a month prior to the course we'll send you a digital copy of Bulletproof SSL and TLS, our
comprehensive guide to SSL/TLS and Internet PKI. You'll get the paper copy on the day.
We'll also give you a bunch of exercises and a hardcopy of the slides.
What You Need to Know
This course is for system administrators, developers, and IT security professionals who wish to learn
the theory and practice of Internet PKI.
- Basic Linux command line skills: moving about, invoking commands, editing configuration files.
- A laptop with a modern browser (Chrome or Firefox) and a SSH client, which you will only need to connect
to your assigned virtual server.
- You should be comfortable using a command-line editor.
We'll provide you with your own virtual server and a sample web application to work on throughout the
This course is also available as an on-site option. Please contact us for more information.