Home Link
Quest Grant

For Businesses

Business Services

Helping the Businesses in our Community.

Regional Services

Everything you need to know to grow in Yavapai County.

Grant Assistance

From grant research to writing services.

Data and Analytics

Research for sustainable business growth.

About Yavapai County

Everything you need to know about commerce Yavapai County.

For Employees & Job Seekers

Career Resources

Personalized training, career counseling, scholarships, and more!

Training Courses

Learn new skills and get ready for your next career move.

Job Fairs and Events

Connect with employers through local job fairs and career events.

Hot Jobs

Top Jobs, Occupations, and Skills in Yavapai County

Job Postings Data Trends

Explore the latest data on job opportunities available from local employers


Loading upcoming events...

Training Courses

Training Course Options

See and compare the different course trainings available through the REDC.

Subject Matter Expert

Train employees and businesses in leadership, professional development, communication, and more

Back to all courses

Cryptography Scenarios

Self-Paced5 Course Hours | 12 Weeks
View Course
Cybersecurity & CISSP®
Cryptography Scenarios


This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.


  • PMI PDUs: 5
    • Strategic & Business Management PDUs: 2
      • Technical PM PDUs: 3
        • IACET CEUs: 0.5
          • HRCI Credits: 5
            • SHRM PDCs: 5


              • Mobile-friendly
              • Audio-enabled
              • Badge and credit-awarding
              • Real-world case studies
              • Fully accessible
              • Games & Flashcards
              • Expert-supported
              • Video content

              learning Outcomes

              • Understand how cryptography works and its role in information security
              • Compare and contrast different ciphers and explain how they work
              • Create substitution ciphers and encode and decode cleartext and ciphertext
              • Discuss how encryption enables secure transmission of sensitive data
              • Explain and compare symmetric and asymmetric cryptography
              • Describe the role of public key infrastructure and key management
              • Apply concepts and knowledge to real-world scenarios that involve cryptographic challenges

              related courses

              • Cybersecurity & CISSP®
                Fundamentals of Application Security

                Fundamentals of Application Security

                Self-Paced3 Course Hours | 12 Weeks
              • Cybersecurity & CISSP®
                Identity and Access Management

                Identity and Access Management

                Self-Paced5 Course Hours | 12 Weeks
              • Cybersecurity & CISSP®
                Introduction to Cybersecurity Concepts and Practices

                Introduction to Cybersecurity Concepts and Practices

                Self-Paced5 Course Hours | 12 Weeks
              Home LinkThe REDC is a Division of Yavapai College.Go to yc.edu

              Sign up for the REDC Newsletter

              Stay in touch with the REDC and learn how we are impacting our community!
              Contact Us