Home Link
About UsOur PartnersBlogCourse Login
  • For Workers & Job Seekers
  • For Businesses & Employers
  • Courses & Training
Contact Us
Back to all courses

Cryptography Scenarios

$79
Self-Paced5 Course Hours | 12 Weeks
View Course
Cybersecurity & CISSP®
Cryptography Scenarios

Description

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.

credits

  • PMI PDUs: 5
  • Strategic & Business Management PDUs: 2
  • Technical PM PDUs: 3
  • IACET CEUs: 0.5
  • HRCI Credits: 5
    • Specified - Strategic Business: 5
  • SHRM PDCs: 5

features

  • Mobile-friendly
  • Audio-enabled
  • Badge and credit-awarding
  • Real-world case studies
  • Fully accessible
  • Games & Flashcards
  • Expert-supported
  • Video content

learning Outcomes

  • Understand how cryptography works and its role in information security
  • Compare and contrast different ciphers and explain how they work
  • Create substitution ciphers and encode and decode cleartext and ciphertext
  • Discuss how encryption enables secure transmission of sensitive data
  • Explain and compare symmetric and asymmetric cryptography
  • Describe the role of public key infrastructure and key management
  • Apply concepts and knowledge to real-world scenarios that involve cryptographic challenges

related courses

Home LinkThe REDC is a Division of Yavapai College.Go to yc.edu
Contact Us