Course Outline
Introduction
- Overview of CipherTrust Manager and its basic functions for government use.
- Initialization of CipherTrust and IP configuration for government systems.
Understanding CipherTrust ProtectDB (CDP), ProtectFile, and ProtectApp
- Using ProtectDB (CDP) for government data protection.
- Using ProtectApp to secure applications in the public sector.
Using CipherTrust Tokenization Server (CTS)
- Overview of the CTS solution for government environments.
- Implementing tokenization techniques for enhanced security.
Using CipherTrust Transparent Encryption (CTE)
- Overview of the CTE solution for government applications.
- Utilizing the CTE solution to ensure data encryption transparency.
CipherTrust Cloud Key Manager (CCKM)
- Overview of the CCKM solution for managing cloud keys in government settings.
- Using the CCKM solution to enhance key management processes.
CipherTrust Key Management Interoperability Protocol (KMIP)
- Implementing the KMIP solution for interoperable key management in government systems.
Summary and Next Steps
Requirements
- Familiarity with security protocols and practices for government
- Experience with system administration and configuration
Audience
- IT professionals in the public sector
- Security administrators for government
Testimonials (5)
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Speed of response and communication
Bader Bin rubayan - Lean Business Services
Course - ISO/IEC 27001 Lead Implementer
The knowledge and understanding of the trainer on the training material was exceptional. The trainer was well aware of the subject, provided practical examples in relevance. I would highly recommend him as a trainer for this training.
Tayyeb Mahmood - Ajman Municipality
Course - COBIT 2019 Foundation
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.