Internet PKI in Depth
Spend a full day to understand both the theory and practice of Internet PKI. Based on the book Bulletproof SSL and TLS. We’ll start with the basics and the theory, then discuss how the PKI is implemented in the real world, and finish with a practical example of a realistic private certification authority.
The course is taught in small classes.
Why This Course is for You
- Learn about key PKI standards and formats
- Understand where practice differs from theory
- Analyze certificate lifecycle in detail
- Evaluate PKI weaknesses and how they affect you
- Deploy robust protection using public key pinning
- Learn about what's coming in the future
- Practise what you've learned
By the end of the day you will have built a fully-functioning private CA—with multiple intermediate CAs and revocation—using a method that you can easily replicate back at work.
This course is for system administrators, developers, and IT security professionals who wish to learn the theory and practice of Internet PKI.
Duration: 1 day
Extras: Lunch and refreshments included
About a month prior to the course we'll send you a digital copy of Bulletproof SSL and TLS, our comprehensive guide to SSL/TLS and Internet PKI. You'll get the paper copy on the day. We'll also give you a bunch of exercises and a hardcopy of the slides.
- Basic Linux command line skills: moving about, invoking commands, editing configuration files.
- A laptop with a modern browser (Chrome or Firefox) and a SSH client, which you will only need to connect to your assigned virtual server. To connect to the server, you will need:
- HTTP/HTTPS on ports 80 and 443
- SSH on port 22
- You should be comfortable using a command-line editor.
a. X.509 certificates
b. Certificate chains
c. Name constraints
d. Trust path building
e. Validation process
3. Internet PKI
a. Certification Authorities
b. Relying parties
c. Certificate types (DV, EV, OV)
d. Certificate lifecycle (validation, issuance, and revocation)
e. CA/B Forum and its standards
g. History of attacks
c. OCSP stapling
d. CRLsets and OneCRL
e. Short-lived certificates
a. Certification Authority Authorization (CAA)
b. Public Key Pinning
i. Static pinning
6. Certificate Transparency
7. PKI ecosystem monitoring
i. SSL Pulse
8. Project: Building and deploying a realistic private CA
We will also provide you with many additional exercises that you can work on in your own time. You'll be able to ask us for help via email. And if you're already familiar with the basics, we'll challenge you with some of the advanced exercises on the day.
Meet the Author
Ivan Ristić is a security researcher, engineer, and author, known especially for his contributions to the web application firewall field and development of ModSecurity, an open source web application firewall, and for his SSL/TLS and PKI research, tools and guides published on the SSL Labs web site.
He is the author of three books, Apache Security, ModSecurity Handbook, and Bulletproof SSL and TLS, which he publishes via Feisty Duck, his own platform for continuous writing and publishing. Ivan is an active participant in the security community and you'll often find him speaking at security conferences such as Black Hat, RSA, OWASP AppSec, and others. He is currently working on his next venture.
Terms and Conditions
Please note that by ordering this course you acknowledge acceptance of Feisty Duck's Terms and Conditions.
Where can I contact the organiser with any questions?
Contact us at firstname.lastname@example.org with any questions about the event.
What is the refund policy?
Any cancellation by you must be made by emailing email@example.com.
You may cancel or reschedule a course subject to the following charges:
- Cancellation or reschedule with more than 60 days’ notice prior to course start date – no charge
- Cancellation or reschedule with 31-60 days’ notice prior to course start date - 50% of the course fee
- Cancellation or reschedule with less than 30 days’ notice prior to course start date - 100% of the course fee
Can't make this date? Tickets sold out? Email firstname.lastname@example.org to be notified about the future dates.