![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners how to redesign Public Key Infrastructure (PKI) to address issues related to revocation expiration and rotation. The course covers topics such as IoT device security, threat models, encryption, identity management, and PKI compared to Trust Domain Identity Intelligence (TDII). The teaching method includes lectures, real-time provisioning demonstrations, and Q&A sessions. This course is intended for security professionals, IoT device manufacturers, system administrators, and individuals interested in enhancing PKI security practices.
Syllabus
Intro
Background
Overview
What is TDI
IoT Hacks
CAS
IOT Devices
Threat Models
Crypto is Hard
What If
Key Terms
Identity
Intel
Encryption
PKI vs TDI
Scenarios
Fleet
Devices
Main Workflow
Server Workflow
Application Workflow
Breach Recovery
Nuclear Recovery
RealTime Provisioning
Route Validation
Open Source
NuStar
Demo
OneID
QA
Taught by
Black Hat