Home Link
Quest Grant

For Businesses

Business Services

Helping the Businesses in our Community.

Regional Services

Everything you need to know to grow in Yavapai County.

Grant Assistance

From grant research to writing services.

Data and Analytics

Research for sustainable business growth.

About Yavapai County

Everything you need to know about commerce Yavapai County.

For Employees & Job Seekers

Career Resources

Personalized training, career counseling, scholarships, and more!

Training Courses

Learn new skills and get ready for your next career move.

Job Fairs and Events

Connect with employers through local job fairs and career events.

Hot Jobs

Top Jobs, Occupations, and Skills in Yavapai County

Job Postings Data Trends

Explore the latest data on job opportunities available from local employers

Events

Loading upcoming events...

Training Courses

Training Course Options

See and compare the different course trainings available through the REDC.

Subject Matter Expert

Train employees and businesses in leadership, professional development, communication, and more

Back to all courses

Security Architecture and Engineering

$79
Self-Paced5 Course Hours | 12 Weeks
View Course
Cybersecurity & CISSPĀ®
Security Architecture and Engineering

Description

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered. This course requires a basic understanding of IT concepts.

credits

  • PMI PDUs: 5
    • Strategic & Business Management PDUs: 2
      • Technical PM PDUs: 3
        • IACET CEUs: 0.5
          • HRCI Credits: 5
            • SHRM PDCs: 5

              features

              • Mobile-friendly
              • Audio-enabled
              • Real-world case studies
              • Fully accessible
              • Games & Flashcards
              • Expert-supported
              • Video content

              learning Outcomes

              • Understand how cryptography works and its role in information security
              • Compare and contrast different ciphers and explain how they work
              • Create substitution ciphers and encode and decode cleartext and ciphertext
              • Discuss how encryption enables secure transmission of sensitive data
              • Explain and compare symmetric and asymmetric cryptography
              • Describe the role of public key infrastructure and key management

              related courses

                Home LinkThe REDC is a Division of Yavapai College.Go to yc.edu

                Sign up for the REDC Newsletter

                Stay in touch with the REDC and learn how we are impacting our community!
                Contact Us