Access Time: 30 Days
This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography.
This course is part of the Cybersecurity suite of courses. However, the course can be taken as a stand-alone course.
Preview a few course pages by clicking through the slideshow below:
After completing this course, you'll be able to:
- Understand how cryptography works and its role in information security
- Compare and contrast different ciphers and explain how they work
- Create substitution ciphers and encode and decode cleartext and ciphertext
- Discuss how encryption enables secure transmission of sensitive data
- Explain and compare symmetric and asymmetric cryptography
- Describe the role of public key infrastructure and key management
- Apply concepts and knowledge to real-world scenarios that involve cryptographic challenges
Target Audience: This course is designed for IT professionals and other adult learners who are interested in information technology security, with an eye towards handling real world scenarios.
Level/Prerequisites: Introductory/No Prerequisites
Estimated time to complete: 3-5 hours
Ask the Expert: This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.
Required Material: This course does not require any additional purchases of supplementary materials.
Successful Completion Requirement for IACET CEU: Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEU credit. Learners will have three attempts at all graded assessments.