Public Key Infrastructure (PKI) Implementation
RCCE students will learn designing and managing certificate authorities and trust chains. RCCE students will learn to apply industry-standard tools and techniques to identify weaknesses and verify security controls. The course covers practical scenarios ranging from initial setup to final reporting. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Public Key Infrastructure (PKI) Implementation
- Explain Course Overview fundamentals
- Execute hands-on tasks for course scope — covering Learning Approach.
- Execute hands-on tasks for core purpose
- Execute hands-on tasks for key components — covering Framework for managing digital, Authentication of entities, Certificate Authorities (CAs).
- Explain Asymmetric Cryptography Foundations fundamentals
- Execute hands-on tasks for key pair generation
- Execute hands-on tasks for digital signatures — covering Encryption Flow.
- Execute hands-on tasks for eddsa ed25519 for performance
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for hierarchical trust — covering Mesh / Web of Trust, Bridge CA Model.
- Design a scalable privilege management architecture with policy and enforcement, including Self-signed certificate, Kept offline for security, and Signed by root or intermediate CA.
- Execute hands-on tasks for root ca — covering Self-signed certificate, Kept offline for security.
| Module 01 | Course Overview |
| Module 02 | Course Scope |
| Module 03 | Core Purpose |
| Module 04 | Key Components |
| Module 05 | Asymmetric Cryptography Foundations |
| Module 06 | Key Pair Generation |
| Module 07 | Digital Signatures |
| Module 08 | EdDSA Ed25519 for performance |
| Module 09 | PKI Trust Models |
| Module 10 | Hierarchical Trust |
| Module 11 | CA Architecture: Root & Subordinate CAs |
| Module 12 | Root CA |
| Module 13 | Subordinate CA |
| Module 14 | Signed by root or intermediate CA |
All hands-on labs run on Rocheston Rose X OS. Students practice public key infrastructure (pki) implementation by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Explain Course Overview fundamentals
- Lab 2: Execute hands-on tasks for course scope
- Lab 3: Execute hands-on tasks for core purpose
- Lab 4: Execute hands-on tasks for key components
- Lab 5: Explain Asymmetric Cryptography Foundations fundamentals
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Public Key Infrastructure (PKI) Implementation, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI