Course Outline
Introduction
- Overview of CipherTrust Manager and it's basic functions
- CipherTrust initialization and IP configuration
Understanding CipherTrust ProtectDB (CDP), ProtectFile and ProtectApp
- Using ProtectDB (CDP)
- Using ProtectApp
Using CipherTrust Tokenization Server (CTS)
- Overview of CTS solution
- Using tokenization
Using CipherTrust Transparent Encryption (CTE)
- Overview of CTE solution
- Using CTE solution
CipherTrust Cloud Key Manager (CCKM)
- Overview of CCKM solution
- Using CCKM solution
CipherTrust Key Management Interoperability Protocol (KMIP)
- Using KMIP solution
Summary and Next Steps
Requirements
- Familiarity with security protocols and practices
- Experience with system administration and configuration
Audience
- IT professionals
- Security administrators
Testimonials (5)
The report and rules setup.
Jack - CFNOC- DND
Course - Micro Focus ArcSight ESM Advanced
The fact that there were practical examples with the content
Smita Hanuman - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
The trainer was extremely clear and concise. Very easy to understand and absorb the information.
Paul Clancy - Rowan Dartington
Course - CGEIT – Certified in the Governance of Enterprise IT
The trainer was very motivated and knowledgeable. The trainer was not only capable of information transfer, she also brought it with humor to lighten the dry theoretical training subject.
Marco van den Berg - ZiuZ Medical B.V.
Course - HIPAA Compliance for Developers
I genuinely was benefit from the communication skills of the trainer.