Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

IDnomic training

Training programs to support you at each step of your project

IDnomic training programs

IDnomic encourages the development of each individual through a comprehensive selection of professional training programs, enabling you to:

  • Refresh working methods and achieve a high level of skills
  • Keep up with technological, legal and structural evolutions
  • Master existing products and learn best practices

IDnomic’s training programs are designed for Security Officers, PKI solution operators, IT company staff, project managers, systems and network architects / administrators…

IDnomic is a certified training organization (accreditation number: 11 92 19072 92), registered with the Paris Region’s Regional Directorate for Business, Competition, Consumer Affairs and Employment (DIRECCTE).

Atos cybersecurity IDnomic training

To follow or contact us:
Linkedin | Twitter

IDnomic basic training modules

IDnomic offers a comprehensive training program for all products and services that can be adapted to your business needs. The majority of the training is delivered onsite at IDnomic facilities.

PKI basics


Duration: 1/2 day – 4 hours

Goals

  • Discover certificates and their lifecycles
  • Learn how to use cryptographic standards and technologies
  • Understand how PKIs are structured
  • Identify links with legislation: digital signatures / international use
  • Discover IDnomic’s products and solutions

Target audience

  • Security officers / IS security managers
  • Project managers
  • Network and systems administrators / architects
  • PKI solution operators

Course requirements

  • University-level education, IT engineer or equivalent experience

Program

  • Cryptography basics
  • Implementing cryptography
  • Introduction to PKI concepts
  • PKI and organizational aspects
  • Legal and regulatory framework
  • Discovering IDnomic’s software solutions
  • Practical work

OT PKI


Duration: 2 days – 14 hours

Goals

  • Understand certificates and their lifecycles
  • Learn how to use cryptographic standards and technologies
  • Learn how to deploy / operate the OT PKI solution

Target audience

  • Security officers / IS security managers
  • Project managers
  • Network and systems administrators / architects
  • PKI solution operators
  • IT company staff

Course requirements

  • University-level education, IT engineer or equivalent experience
  • General knowledge of Linux/Unix/Windows systems and infrastructure or PKI BASICS module

Program

Day 1:

  • Presentation of the OT PKI product architecture and components
  • Installing and configuring the OT PKI product
  • Managing OT PKI and the certificate lifecycle
  • Definition and use of workflows / processes
  • Troubleshooting / audit log
  • OT PKI functional administration

Day 2:

  • System operations
  • Practical work
  • Product certification test

ID CA


Duration: 1,5 days – 10,5 hours

Goals

  • Know the importance of an organization
  • Learn how to use cryptographic standards and technologies
  • Generate certificates and manage their lifecycles
  • Configuring ID CA solutions
  • Managing the administration of ID CA solutions

Target audience

  • Security officers / IS security managers
  • Project managers
  • IT company staff, beginner or intermediate level

Course requirements

  • University-level education, IT engineer or equivalent experience
  • General knowledge of Linux/Unix/Windows systems and infrastructure or the content of IDnomic’s PKI BASICS training module

Program

Day 1:

  • Presentation of the new ID CA product
  • Presentation of the architecture (ID CA installation already completed)
  • Presentation of the application
  • Presentation of the first scenario defined for ID CA configuration (enterprise-focused)
  • Practical work
    – Configuring partitions
    – Configuring CAs
    – Configuring certificate profiles
    – Configuring application users
  • Certificate suspension and revocation

Day 2:

  • Presentation of the functionalities used during the day
  • Practical work:
    – Configuring publication policies (connection with LDAP & SSH)
    – Importing / exporting configurations
    – Viewing audit logs
    – Creating statistical reports
  • Final test

ID RA


Duration: 1,5 days – 10,5 hours

Goals

  • Know the importance of an organization
  • Learn how to use cryptographic standards and technologies
  • Generate certificates and manage their lifecycles
  • Configure the ID RA solutions
  • Manage administration for the ID RA solutions

Target audience

  • Security officers / IS security managers
  • Project managers
  • IT company staff, beginner or intermediate level

Course requirements

  • University-level education, IT engineer or equivalent experience
  • General knowledge of Linux/Unix/Windows systems and infrastructure or the content of IDnomic’s PKI BASICS training module

Program

Day 1:

  • Presentation of the new ID RA product
  • Presentation of the architecture (ID RA installation already completed)
  • Presentation of the first scenario defined for ID RA configuration (enterprise-focused)
  • Practical work:
    – Configuring partitions
    – Configuring CAs
    – Configuring access points
    – Configuring keystores
    – Configuring notifications
    – Configuring workflows

Day 2:

  • Presentation of the functionalities and protocols used for the creation of SCEP workflows
  • Practical work:
    – Continued creation of workflows
    – Issuance of certificates (X.509 and SCEP)
    – Renewal, revocation and recovery of certificates
    – Use of the Enrollment Entity
    – Importing / exporting configurations
    – Viewing audit logs
  • Final test

CMS


Duration: 2 days – 14 hours

Goals

  • Understand certificates and smartcards
  • Learn how to use smartcards within a certificate delivery infrastructure
  • Learn how to deploy CMS and its modules
  • Learn how to use CMS
  • Understand the key components for using CMS with any PKI

Target audience

  • Security officers / IS security managers
  • Project managers
  • Network and systems administrators / architects
  • CMS solution operators

Course requirements

  • University-level education, IT engineer or equivalent experience
  • General knowledge of Linux/Unix/Windows systems
  • Participants must have completed the PKI BASICS or ID CA modules

Program

Day 1:

  • Presentation of the product components and smartcard concept (physical and virtual)
  • Installing and configuring CMS
  • Managing CMS and the lifecycle for physical and virtual cards
  • Definition and use of workflows / processes
  • Troubleshooting / audit log
  • CMS functional administration
  • CMS interactions with OT PKI or ID CA

Day 2:

  • System work
  • Practical work
  • Product certification test
  • The advanced Virtual Guard module is available to clients upon request and supplements the CMS module

ID PKI Suite


Duration: 5 days – 35 hours

Goals

  • Know the importance of an organization
  • Learn how to use cryptographic standards and technologies
  • Trust hierarchy management and configuration, certificate management and profile definition
  • Know how to use smart cards in a certificate management infrastructure
  • Generate certificates and manage their lifecycles
  • Configure the ID CA, ID RA and CMS solutions
  • Manage and administrate for the ID PKI suite solutions

Target audience

  • Security officers / IS security managers
  • Project managers
  • IT company staff, beginner or intermediate level

Course requirements

  • University-level education, IT engineer or equivalent experience
  • General knowledge of Linux/Unix/Windows systems and infrastructure or the content of IDnomic’s PKI BASICS or ID CA training modules

Program

Day 1:

  • Presentation of the new ID CA product
  • Presentation of the architecture (ID CA installation already completed)
  • Presentation of the application
  • Presentation of the first scenario defined for ID CA configuration (enterprise-focused)
  • Practical work:
    – Configuring partitions
    – Configuring CAs
    – Configuring certificate profiles
    – Configuring users
  • Certificate suspension and revocation

Day 2:

  • Presentation of the functionalities used during the day
  • Practical work:
    – Configuring publication policies (connection with LDAP and SSH)
    – Importing / exporting configurations
    – Viewing audit logs
    – Creating statistical reports
  • Presentation of the new ID RA product
  • Presentation of the architecture (ID RA installation already completed)
  • Presentation of the scenario defined for ID RA configuration
  • Practical work:
    – Configuring partitions
    – Configuring trusted CAs
    – Configuring keystores
    – Configuring PKI access points
    – Configuring notifications
    – Configuring workflows

Day 3:

  • Presentation of the functionalities and protocols used for the creation of SCEP workflows
  • Practical work:
    — Continued creation of workflows
    – Issuance of certificates (X.509 and SCEP)
    – Renewal, revocation and recovery of certificates
    – Use of the Enrollment Entity
    – Viewing audit logs
    – Import / Export configuration

Day 4:

  • Presentation of the product components and smartcard concept (physical and virtual)
  • Practical work:
    – Installing and configuring CMS
    – CMS initialization (AC root management, security initialization)

Day 5:

  • Presentation of the different menus and explanation of the concepts used
  • CMS and lifecycle management of physical and virtual cards
  • Practical work:
    – Data protection
    – Creation of applications and repositories
    – Management of smart cards
    – Using the CMS client
    – Creation and use of card management profiles
    – Configuration of internal data sources
    – Notification configuration
    – Log management
    – Backup and restore
  • Final test

Mobile guard


Duration: 2 days – 14 hours

Goals

  • Learn about certificates and their use on mobile devices
  • Become proficient at: Installing Mobile Guard and its modules – Initializing Mobile Guard – Using Mobile Guard
  • Understand the key components for using Mobile Guard with any PKI
  • Accessing corporate Wi-Fi networks
  • Authentication on corporate VPNs – on email and calendar servers such as Microsoft Exchange – on your intranet
  • Receiving and sending signed and/or encrypted emails

Target audience

  • Security officers / IS security managers
  • Project managers
  • Network and systems administrators / architects
  • Mobile Guard solution operators
  • IT company staff, beginner or intermediate level

Course requirements

  • University-level education, IT engineer or equivalent experience
  • General knowledge of Linux/Unix/Windows systems and infrastructure or content of IDnomic’s PKI BASICS / OT PKI / CMS training modules

Program

Day 1:

  • Presentation of the product components and PKI concept for Mobile
  • Presentation of the product architecture and dependencies
  • Installing the Mobile Guard product
  • Initializing Mobile Guard bases
  • Creating keys, enrolling certificates used internally by the CMS (SSL, logs, etc.)
  • Mobile Guard functional administration
  • Mobile Guard interactions with OT PKI
  • Practical work

Day 2:

  • Configuring the system
  • Managing key storage
  • Authentication schemes
  • Data sources
  • Creating and managing profiles (AirWatch, MobileIron, Mas360, iOS)
  • Practical work
  • Final test

BAC / EAC


Duration: 2 days – 14 hours

Goals

  • Learn how an ePassport works
  • Set up certificate request processes to check documents and lifecycles
  • Learn how to use cryptographic standards and technologies
  • Deploy and use IDnomic’s BAC and EAC solutions
  • Learn about the ISO7816CVC certificate

Target audience

  • Security officers / IS security managers
  • Project managers
  • Network and systems administrators / architects
  • PKI solution operators

Course requirements

  • University-level education, IT engineer or equivalent experience
  • General knowledge of Linux/Unix/Windows systems and infrastructure
  • PKI BASICS module

Program

Day 1:

  • Presentation of the product architecture and components
  • Installing and configuring BAC / EAC products
  • Definition and use of workflows / processes
  • Troubleshooting / audit log
  • BAC functional administration

Day 2:

  • System operations
  • Practical work

Training conditions

IDnomic is certified as a training organization by the region Ile de France (provider number: 11 92 19072 92).

Training registration

It is possible to pre-book a session, however the reservation is not confirmed until an order is submitted to IDnomic with the following details:

  • Date of session desired
  • Name and e-mail address of the person to be trained
  • The Training Reference
  • Billing information

Atos cybersecurity IDnomic contact us

To register and request information:

  • By email: training-idnomic@atos.net
  • By post: IDnomic – Département formation – 175 rue Jean-Jacques Rousseau,
    92138 Issy les Moulineaux, France.

Terms of payment

  • Invoicing and payment on order
  • Any training started is due and will be charged in full
  • When registering, participants or their companies must mention the fact that the training is covered by the OPCA under the same time limits as the traditional registration.

Session planning

The session times are:

  • Morning from 09:30 to 12:30 (1h for lunch time)
  • Afternoon from 13:30 to 17:30

Minimum attendance requirements

  • IDnomic reserves the right to cancel a session if the number of registered students does not exceed four (4)

Cancellation policy

Any person registered for a session can cancel their participation, with the following restrictions:

  • If the cancellation is received at least 1 month before the session, the customer will be charged 50% of the cost of the session
  • If the cancellation is received between 1 month and 2 weeks before the session, the customer will be charged 70% of the cost of the session
  • If the cancellation is received less than 2 weeks before the session, the customer will be charged 100% of the cost of the session.


Change of participants

Any individual participating in a training session can give their place to another by informing IDnomic in advance.

Financial conditions

Training fees are defined per person and per type of training, based on the training delivered at the IDnomic training center. These fees include:

  • Training manuals
  • Meal during the entire duration of the training
  • Passing of the certification (PKI and CMS)

Travel and housing costs are not included and are charged to the person or organization requesting the training.

Training center

IDnomic – Training department

175, Rue Jean Jacques Rousseau
92138 Issy les Moulineaux
FRANCE

Discover PKI solutions

IDnomic for users

Protect the digital identities of your users.
Visit solution page >

IDnomic for documents

Protect the digital identities to a physical or electronic document.
Visit solution page >

IDnomic for objects

Protect the digital identities of your machine and connected object.
Visit solution page >

IDnomic for transactions

Provide the information needed to verify the digital identity.
Visit solution page >

Interested in our IDnomic training program?