Skip to content

Webinar: Register For Our Upcoming Webinar

Register Now

Shop > HSM Training > Entrust nShield

Entrust nShield HSM Training

Build practical expertise in configuring and operating Entrust nShield HSMs. Our expert-led training covers Security World setup, nShield Connect, PKI integration, and key management, giving you the skills to protect your cryptographic infrastructure with confidence.

Entrust nShield HSM Training

Trusted By

  • American Airlines logo
  • Anheuser-Busch InBev logo
  • Blue Cross Blue Shield logo
  • Builders FirstSource logo
  • Centene Corporation logo
  • CBCInnovis logo
  • Dell Technologies logo
  • Intel logo
  • Intrado logo
  • JC Penney logo
  • Lumen logo
  • Magella Health logo
  • NTT Data logo
  • OU Health logo
  • P&G logo
  • Pega logo
  • Pfizer logo
  • Protegrity logo
  • N-CPHER logo
CURRICULUM FOCUS

Who is this training for?

Tailored paths ensuring that whether you’re just starting or managing global infrastructure, your learning is relevant.

Beginner

For graduates or security newcomers. Master foundational cryptography, Security World concepts, and basic nShield setup with no prior experience needed.

Intermediate

For system admins and security engineers. Deep dive into nShield Connect configuration, deployment, troubleshooting, and PKI integration workflows.

Expert

For architects and lead developers. Custom nCore API integrations, high-availability deployments, and FIPS 140-2 Level 3 compliance standards.

Course Contents

Gain real-world HSM expertise with our in-depth, hands-on training designed to help you confidently configure, deploy, and manage enterprise-grade Hardware Security Modules.

Module 01 – Introduction to Cryptography

15 lectures 40 mins

  • Module Overview

    00:36

  • Module Agenda

    00:50

  • Basics of Cryptography

    00:16

  • What is Cryptography?

    06:20

  • Types of Cryptography

    00:28

  • Symmetric Key Cryptography

    06:07

  • Asymmetric Key Cryptography

    04:50

  • Symmetric vs Asymmetric Key Cryptography

    03:09

  • Hybrid Encryption

    03:32

  • Hash Function

    02:57

  • Digital Signatures

    04:20

  • Where to use Cryptography?

    00:22

  • Public Key Infrastructure (PKI)

    04:24

  • Digital Certificates

    05:33

  • Module Review
Module 02 – Introduction to the nShield HSM

24 lectures 87 mins

  • Module Overview

    00:25

  • Module Agenda

    01:19

  • Introduction to HSMs

    00:16

  • What is an HSM?

    04:55

  • Why do you need an HSM?

    04:42

  • HSM vs Software-based solution

    07:31

  • FIPS 140-2 Compliance

    00:17

  • FIPS 140-2 Level 3

    04:31

  • Integration of HSMs

    00:17

  • PKI with HSM

    04:55

  • IoT with HSM

    03:56

  • Code Signing with an HSM

    05:24

  • Cloud Services with an HSM

    03:48

  • TLS/SSL Environments with an HSM

    02:41

  • Introduction to the nShield Family

    00:21

  • The nShield Family

    04:02

  • Portable USB HSM

    07:29

  • PCIe Embedded HSM

    09:34

  • Network Attached HSM

    07:12

  • nShield as a Service (nSaaS)

    05:47

  • Security World and Card Sets

    00:26

  • Security World

    03:29

  • nShield as a Service (nSaaS)

    05:47

  • Card Sets

    03:52

  • Module Review
Module 03 – Configuration and Setup

21 lectures 53 mins

  • Module Overview

    00:40

  • Module Agenda

    01:21

  • nShield Client Software Installation

    00:20

  • nShield Software Architecture

    02:36

  • Installation Steps

    02:59

  • Important File Locations

    02:01

  • Client Considerations

    04:06

  • Basic HSM Configuration

    00:13

  • nShield Connect Front Panel

    01:31

  • HSM Network Configuration

    03:49

  • RFS Configuration

    00:27

  • Purpose of RFS

    02:37

  • Setup RFS

    05:03

  • Setup Autopush

    02:04

  • Export HSM Log to RFS

    02:07

  • HSM Clients

    00:33

  • Client Features

    04:43

  • Enrolling Clients using Front Panel

    03:37

  • Nethsmenroll command

    02:35

  • Module Review
  • Lab Exercise 1

    07:38

Module 04 – Security World and Keys

24 lectures 81 mins

  • Module Overview

    00:26

  • Module Agenda

    01:52

  • About FIPS Mode

    00:18

  • What is FIPS Mode?

    04:13

  • FIPS Mode Drawbacks

    05:06

  • Security Worlds and Creation

    00:36

  • Security World Settings

    03:51

  • ACS K:N Considerations

    06:45

  • Creating a Security World

    04:47

  • Loading a Security World

    01:32

  • Operational Modes and Utilities

    00:42

  • nShield Edge

    02:00

  • nShield Solo

    01:28

  • Command Line Module

    03:31

  • Enquiry Utility

    04:04

  • Nfkminfo Utility

    04:09

  • Application Keys and OCS Card Creation

    00:15

  • Application Key Tokens

    04:20

  • Key Protection

    03:01

  • Operator Card Sets (OCS)

    03:08

  • Key Generation – OCS cards

    02:46

  • Key Generation using Keysafe

    01:27

  • Module Review
  • Lab Exercise 2

    11:26

Module 05 – HSM Administration and Upgrades

23 lectures 47 mins

  • Module Overview

    00:27

  • Module Agenda

    01:03

  • About Remote Administration

    00:29

  • Remote Operator vs Remote Administrator

    03:52

  • Remote Administration

    02:44

  • Dynamic Slots

    02:13

  • Authorized Card List

    03:17

  • Firmware Update

    00:17

  • Firmware Update Considerations

    02:54

  • Firmware Update Warning

    03:32

  • Identifying & Updating Firmware

    03:02

  • Updating nShield Connect

    01:49

  • Remote Upgrade – Front Panel

    01:57

  • Remote Upgrade – Command Line

    02:50

  • Disaster Recovery

    00:21

  • Passphrase Recovery

    02:30

  • Administrator Cardset Recovery

    03:13

  • Replace OCS/Key Recovery

    01:49

  • Rocs Utility

    03:05

  • KeySafe

    00:48

  • KeySafe Software

    06:01

  • Module Review
  • Lab Exercise 3
Module 06 – Advanced HSM Features

17 lectures 30 mins

  • Module Overview

    00:20

  • Module Agenda

    01:17

  • Load Sharing

    00:28

  • What is Load Sharing?

    02:21

  • HSM Pool Mode

    02:42

  • PKCS#11 Library

    03:16

  • Feature Activation

    00:21

  • Optional Features

    02:05

  • Available Features

    02:25

  • Enable Features – PCIe & USB HSM

    01:53

  • Enable Features – Network HSM

    02:24

  • Loading Features Remotely

    02:26

  • CodeSafe

    00:22

  • What is CodeSafe?

    02:05

  • CodeSafe Application

    03:13

  • Module Review
  • Lab Exercise 4
Module 07 – Post Quantum Cryptography (PQC)

5 lectures 30 mins

  • Introduction to Post-Quantum Cryptography (PQC)

    05:00

  • Categories of PQC Algorithms

    10:00

  • PQC Code Signing Algorithms

    10:00

  • The Role of HSMs in PQC Transition

    05:00

  • Lab Exercise 5
Final Assessment

2 lectures

  • Certification Exam
  • Course Feedback

Key Learnings

Develop expert-level skills with hands-on labs, real-world use cases, and industry-leading security practices.

Know More
  • Master nShield HSM fundamentals, cryptographic operations, and key management.

  • Configure, deploy, and maintain secure nShield HSM.

  • Ensure compliance with security standards and regulatory requirements.

  • Gain hands-on experience with interactive labs and real-world scenarios.

Area of Focus

Master Entrust nShield HSM with Expert Training

Gain hands-on expertise in Entrust nShield HSM with our industry-leading training. Choose from instructor-led sessions for real-time guidance or on-demand learning for flexibility.

Entrust nShield HSM Training

Training Overview

Learn at your own pace with expert-designed video modules, offering flexibility, comprehensive knowledge, and practical skills to build and manage a secure nShield environment effortlessly.

$ 1,699.00/-
  • Lifetime access to all nShield HSM course modules and lab guides.

  • Hands-on labs covering Security World setup, key lifecycle, and PKI integration.

  • Certificate of completion with CPE credits upon passing the final assessment.

Enroll Now
HSM nShield Training

Certificate of Completion

Complete the full training, score 70% or higher on the HSM exam, and earn a certificate qualifying for ISC2 continuing education credits.

What Our Students Say

About Our Training

Discover Our

Latest Resources

  • Reports
  • White Papers
  • Podcast

Global Encryption Trends 2025 Report

Explore the insights and trusted expertise of over 5,233 experts

Spanning multiple geographies and industry sectors across the globe for the latest insights.

Read more
Case Studies

Certificate Lifecycle Maturity Model

Discover the structured framework to enhance certificate management

Enhance automation, improve resilience, and achieve crypto agility with our white paper.

Read more
Case Studies

Discover Our Bi-Weekly Podcast: The Encryption Edge

Explore the real-world applications of cryptography, tools, and trends shaping the industry.

Bridging the gap between technical depth and practical application to decode the complexities of modern cryptography.

Listen Now
Case Studies