YoVDO

PKI Deployments and Flexible Post-Quantum Migration Strategies

Offered By: PKI Consortium via YouTube

Tags

Public Key Infrastructure Courses Cryptography Courses Network Security Courses TCP/IP Courses Post-Quantum Cryptography Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and strategies for transitioning Public Key Infrastructure (PKI) deployments to post-quantum (PQ) cryptography in this 38-minute talk by Greg Wetmore, Vice President of Product Development at Entrust. Delve into the diverse landscape of X.509 use cases and learn how to classify different PKI deployments based on the unique challenges they face during PQ transition. Discover the importance of cryptographic bill of materials (CBOM) for identifying crypto in use, understand the impact of hardware lock-in on migration, and examine the security properties required during the transition process. Gain insights into a suite of crypto discovery and transition tools, and learn how to apply them to various migration types and security requirements, ensuring a flexible and effective PQ migration strategy for your organization's PKI deployment.

Syllabus

PKI deployments are as unique as any snowflake; how to build equally flexible PQ migration strategie


Taught by

PKI Consortium

Related Courses

Introduction to Internetworking with TCP/IP
openHPI
Computer Networks
University of Washington via Coursera
Networking for Web Developers
Udacity
Computer Networks and the Internet
Kiron via edX
Introduction to TCP/IP
Yonsei University via Coursera