Digital Rights Management Course


Course Cover

Register for this course

We are proud to offer this course in a variety of training formats to suit your needs. We use the highest quality learning facilities to make sure your experience is as comfortable as possible. Our face to face calendar allows you to choose any classroom course of your choice to be delivered at any venue of your choice - offering you the ultimate in convenience and value for money.

Great news! While we don’t have specific dates scheduled right now, you have the exciting opportunity to pick the date that works perfectly for you. Just let us know your preference, and we’ll take care of the rest to make it happen seamlessly

Request Custom Schedule

Introduction

Content Protection for broadcasters and multimedia delivery is highly important for protecting Intellectual property. This course examines the technical architecture of Digital Rights Management (DRM) systems used by broadcasters and for Internet delivered Multimedia Service in a practical engineering environment. It identifies the objectives and key techniques necessary for successful system implementation, examines the architectures used by the major commercial systems and compares the functions of each.

The course will examine the typical server functions that are responsible for providing the licenses to users and for serving the keys. It will compare and contrast the main DRM technologies (Microsoft PlayReady, Google Widevine, Apple FairPlay, Adobe Primetime, Marlin MS3) and identify which player platforms are supported. Practical implementation of DRM within players will be considered and the mechanisms for troubleshooting studied.

Duration

5 Days

Who Should Attend

Project Managers, Systems Engineers, Systems Integrators, Developers and service delivery engineers who have and interest in learning about the security of Multimedia content over an IP network.


Course Level:

Course Objectives

At the end of this IRES training course, participants will learn:

·         Identify the functions of Digital Rights Management systems

·         Compare cryptographic techniques employed in DRM to identify strengths and weaknesses

·         Analyse building blocks of a generic DRM system

·         Identify how Common Encryption can be deployed in multi-DRM environments

·         Compare options for Player Technologies on multiple platforms

·         Compare rights expression languages and determine how rights can be defined

·         Describe different Digital Rights Management servers needed in a full service

·         Compare Microsoft PlayReady, Google Widevine, Apple FairPlay, Adobe Primetime and Marlin MS3 DRM systems


Course Outline

Module 1; Content Protection Using DRM 

  • Objectives of content protection
  • Intellectual property that must be protected
  • Legal and technical requirements

Module 2; Cryptographic tools

  • Encryption
  • Symmetric and public key encryption systems
  • Stream and block ciphers
  • Key length and its impact upon security
  • Extending security using Cypher Block Chaining (CBC)
  • Private Key and Public Key Schemes Compared
  • Content Scrambling Systems (CSS)
  • AES encryption standard
  • Authentication Concepts
  • Digital signatures
  • Mutual Authentication
  • The concept of Trust
  • Certification Authorities
  • Securing Protocol Stacks
  • Encapsulated Payload Security and Authentication Headers
  • Secure Socket Layer (SSL)
  • Watermarking systems
  • Protection Systems

Module 3; Digital Rights Management Systems: Concepts and the Law

  • Copyleft and Copyright
  • Fair use
  • Floating licensing
  • Hardware restrictions
  • License manager
  • Digital Rights Languages
  • Open Music Model
  • Product activation
  • Smart Cow Problem
  • Software metering
  • DRM in the era of mass surveillance
  • Superdistribution
  • Tivoization
  • Trusted Computing
  • Voluntary Collective Licensing
  • DRM Applied to Hardware
  • DRM Applied to Software
  • Electronic Document and Records Management System (EDRMS)

Module 4; Digital Rights Management Systems: Architecture and Function

  • Typical DRM Models
  • Components of a DRM Deployment
  • Protected Services
  • DRM Delivery Model
  • Compliance and Robustness
  • Protected Media Path
  • Mechanisms for defining Rights
  • Policies and Policy Sets
  • License Classes
  • Licensing Individuals and devices
  • Subscriber Domain License
  • Deployment and Monitoring DRM

Module 5; Features of DRM systems

  • Microsoft PlayReady
  • Google Widevine
  • Apple FairPlay
  • Adobe Primetime

Module 6; Deployment of Protected Services 

  • Deployment issues
  • Building and validating servers
  • Deploying packaging services
  • Interfacing with CDNs
  • System Testing
  • Verification of Performance

 


Related Courses


Course Administration Details:

Methodology

These instructor-led training sessions are delivered using a blended learning approach and include presentations, guided practical exercises, web-based tutorials, and group work. Our facilitators are seasoned industry experts with years of experience as professionals and trainers in these fields. All facilitation and course materials are offered in English. Participants should be reasonably proficient in the language.

Accreditation

Upon successful completion of this training, participants will be issued an Indepth Research Institute (IRES) certificate certified by the National Industrial Training Authority (NITA).

Training Venue

The training will be held at IRES Training Centre. The course fee covers the course tuition, training materials, two break refreshments, and lunch. All participants will additionally cater to their travel expenses, visa application, insurance, and other personal expenses.

Accommodation and Airport Transfer

Accommodation and Airport Transfer are arranged upon request. For reservations contact the Training Officer.

Tailor-Made

This training can also be customized to suit the needs of your institution upon request. You can have it delivered in our IRES Training Centre or at a convenient location. For further inquiries, please contact us on:

Payment

Payment should be transferred to the IRES account through a bank on or before the start of the course. Send proof of payment to [email protected]


Course Registration

Click here to register for this course.

Register Now
Customize Attendance Dates

Customized Schedule is available for all courses irrespective of dates on the Calendar. Please get in touch with us for details.

Information Request

Do you need more information on our courses? Talk to us.


Who else has taken this course?


# Job Title Organisation Country
1 Student University of Ibadan Nigeria
Customize your Dates of Attendance
📱 Install our app for a better experience!