Course Outline
Introduction
- Overview of CipherTrust Manager and its basic functions
- CipherTrust initialization and IP configuration
Understanding CipherTrust ProtectDB (CDP), ProtectFile, and ProtectApp
- Using ProtectDB (CDP)
- Using ProtectApp
Using CipherTrust Tokenization Server (CTS)
- Overview of the CTS solution
- Using tokenization
Using CipherTrust Transparent Encryption (CTE)
- Overview of the CTE solution
- Implementing the CTE solution
CipherTrust Cloud Key Manager (CCKM)
- Overview of the CCKM solution
- Implementing the CCKM solution
CipherTrust Key Management Interoperability Protocol (KMIP)
- Using the KMIP solution
Summary and Next Steps
Requirements
- Familiarity with security protocols and best practices
- Experience in system administration and configuration
Audience
- IT professionals
- Security administrators
Testimonials (4)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects
Munirah Alsahli - GOSI
Course - CGEIT – Certified in the Governance of Enterprise IT
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.