data-center-soc-noc , policies , security , visio-stencils

PGP Encryption Basis for Systems Engineer’s

February 28, 2020

Overview: 

This two-day course is designed to provide Sales Engineers with the basic underlying technology of PGP as well as its features and functions.   All topics are supported by hands-on exercises specifically designed to increase knowledge retention, which includes discussions of algorithms used in PGP, key creation and distribution, and the use of encryption and digital signatures to secure information and communications.   Students are provided the opportunity to install and configure these products within a networked Windows NT lab environment.

Course Topical Outline

Security Principles & Technology

Confidentiality, Integrity, Availability

Cryptography & its role

What a key is & does

Secret keys & public keys

Symmetric & asymmetric encryption

Keys used in PGP

Importance of key size & life

How public & private keys work together

Hashes, fingerprints & signatures

Algorithms used in PGP

How public key encryption works in PGP

PGP keys & X.509 certificates

Web of trust vs. hierarchical model

PGP Backgrounder

Brief history of PGP

Issues, what’s new

PGP version compatibility

Supported applications

Diffie-Hellman vs. RSA functionality

IPSEC standards & PGPnet

Export control laws concerning PGP

PGP Advanced Functionality    

  • Setting options
  • Random seed generation       
  • Additional decryption keys
  • Designated revoker keys
  • Corporate signing keys                      
  • Splitting key shares
  • Configuring & using PGPnet VPN
  • PGP Command line

 

PGP Disk

  • Creating & using a PGP volume
  • Using PGP wipe
  • Automated freespace wiping

  

Requesting X.509 certificates for PGP keys

 

PGP Desktop Basics

Installing PGP

PGP menus & toolbar

Generating key pairs

Protecting your passphrase

Three methods to distribute public keys

Three methods to obtain public keys

Signing and verifying files and emails

Encrypting and decrypting email and files

Reviewing PGPlog

Fingerprint word list

Validity vs. trust

Icons & what they mean

Creating photo ID’s

Conventional encryption using passphrases

Self-decrypting archives

Clipboard functionality

Using secure viewer

Creating distribution groups

Creating Custom PGP Clients

  • Implementing policy through PGP
  • Configuring the client install with Admin Wizard
  • Installing and using a custom PGP client

Certificate Server

  • Role of the certificate server
  • Installing and configuring
  • Monitoring and logging
  • Using replication within an organization

Policy Management Agent Server

  • Role of the PMA server
  • Implementation issues

 

Course Goals and Objectives                                           

PGP Course Goals

 

 System Engineers completing this course should be able to describe basic underlying technology, and satisfactorily demonstrate and explain product features and functions in a customer environment. 

PGP Course Objectives

A student who successfully completes this course should be able to perform the following:

PRINCIPLES, TECHNOLOGY, BACKGROUND

Describe and explain:

  1. Three basic principles of security and how PGP meets that requirement
  1. What a key is, types of keys used, importance of key size
  1. The differences between symmetric and asymmetric encryption
  1. How public/private key encryption works in PGP
  1. What algorithms are incorporated and what function they perform
  1. What a hash, fingerprint, digital signature and certificate are
  1. Brief history of PGP & the impact of export controls
  1. Trust models for PGP keys and X.509 certificates
  1. Interoperability with X.509 certificates
  1. IPSEC standards and its role in PGP VPN


PRODUCT FEATURES & FUNCTIONS

Demonstrate and explain:

  1. Installing and configuring PGP Desktop
  1. PGP menus and toolbar functions
  1. Creating and distributing keys
  1. Signing and verifying email and application files
  1. Encrypting and decrypting email and application files
  1. Creating and using PGPdisk to secure files
  1. Using PGP wipe to securely erase files
  1. Creating distribution groups
  1. Revoking keys and designating revokers
  1. Using key shares, corporate signing and additional decryption keys
  1. Using PGP Command line
  1. Using peer to peer virtual private networking (PGP VPN)
  1. Configuring and deploying custom PGP clients using PGP Admin Wizard
  1. Installing and configuring PGP certificate server
  1. Administering and replicating certificate server