Course Outline
Introduction to Encryption and Key Management
- Symmetric vs asymmetric encryption
- Key usage in data encryption and authentication
- Why key management matters for security and compliance
Key Lifecycle Management
- Key generation and distribution
- Key rotation and expiration
- Key archival and secure deletion
Access Control and Key Protection
- Role-based access to key operations
- Separation of duties and audit trails
- Hardware Security Modules (HSMs)
Key Management Systems and Architectures
- Overview of commercial and open-source KMS
- Architecture for secure key storage and management
- Integrating KMS with applications and services
Cloud Key Management Practices
- Key management in AWS, Azure, and Google Cloud
- Bring Your Own Key (BYOK) vs Cloud-native keys
- Multi-cloud key management strategies
Compliance and Auditing
- Key management in PCI DSS, HIPAA, GDPR, and NIST
- Auditing key usage and implementing alerting
- Incident response for compromised keys
Case Studies and Best Practices
- Enterprise-scale key management deployment
- Common pitfalls and mitigation strategies
- Designing your organization’s key management policy
Summary and Next Steps
Requirements
- Understanding of basic encryption and cryptography concepts
- Experience working with IT infrastructure or security systems
- Familiarity with cloud environments is helpful
Audience
- Security engineers
- IT administrators managing sensitive data
- Compliance and risk professionals
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from €6840 online delivery, based on a group of 2 delegates, €2160 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (5)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
I genuinely was benefit from the communication skills of the trainer.
Flavio Guerrieri
Course - CISM - Certified Information Security Manager
I genuinely enjoyed the real examples of the trainer.