YoVDO

PKI Deployments and Flexible Post-Quantum Migration Strategies

Offered By: PKI Consortium via YouTube

Tags

Public Key Infrastructure Courses Cryptography Courses Network Security Courses TCP/IP Courses Post-Quantum Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and strategies for transitioning Public Key Infrastructure (PKI) deployments to post-quantum (PQ) cryptography in this 38-minute talk by Greg Wetmore, Vice President of Product Development at Entrust. Delve into the diverse landscape of X.509 use cases and learn how to classify different PKI deployments based on the unique challenges they face during PQ transition. Discover the importance of cryptographic bill of materials (CBOM) for identifying crypto in use, understand the impact of hardware lock-in on migration, and examine the security properties required during the transition process. Gain insights into a suite of crypto discovery and transition tools, and learn how to apply them to various migration types and security requirements, ensuring a flexible and effective PQ migration strategy for your organization's PKI deployment.

Syllabus

PKI deployments are as unique as any snowflake; how to build equally flexible PQ migration strategie


Taught by

PKI Consortium

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity