Skip To Content
Cryptography Scenarios is a Course

Cryptography Scenarios

Time limit: 90 days

$99 Enroll

Full course description

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.

Learning Outcomes:

  • Understand how cryptography works and its role in information security
  • Compare and contrast different ciphers and explain how they work
  • Create substitution ciphers and encode and decode cleartext and ciphertext
  • Discuss how encryption enables secure transmission of sensitive data
  • Explain and compare symmetric and asymmetric cryptography
  • Describe the role of public key infrastructure and key management
  • Apply concepts and knowledge to real-world scenarios that involve cryptographic challenges

Credentials:

PMI PDUs: 5Strategic & Business Management PDUs: 2Technical PM PDUs: 3IACET CEUs: 0.5 (Contact Hours: 5 hours)HRCI Credits: 5 (Type: Specified - Strategic Business)SHRM PDCs: 5