Leadership Development
Technology & Data Science
Computer Applications
Cybersecurity & CISSP
Data Management & Analytics
Emerging Technologies
Web Design
Project Management
Organizational Effectiveness
Essential Business Functions
Innovation & Entrepreneurship
Personal Development
Teaching & Learning
Events & Community
Cryptography Scenarios
Course Description
An introduction to the key concepts of cryptography and security engineering. Examines the role of encryption in information security and considers common encryption methods. Features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world.
Learning Outcomes
After completing this course, the learner should be able to:
- Understand how cryptography works and its role in information security
- Compare and contrast different ciphers and explain how they work
- Create substitution ciphers and encode and decode cleartext and ciphertext
- Discuss how encryption enables secure transmission of sensitive data
- Explain and compare symmetric and asymmetric cryptography
- Describe the role of public key infrastructure and key management
- Apply concepts and knowledge to real-world scenarios that involve cryptographic challenges