PSC110 - Cryptography Scenarios
Course Description
This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.
Learner Outcomes
After completing this course, you'll be able to:
- Understand how cryptography works and its role in information security
- Compare and contrast different ciphers and explain how they work
- Create substitution ciphers and encode and decode cleartext and ciphertext
- Discuss how encryption enables secure transmission of sensitive data
- Explain and compare symmetric and asymmetric cryptography
- Describe the role of public key infrastructure and key management
- Apply concepts and knowledge to real-world scenarios that involve cryptographic challenges
Upon completion of the course, learners may be eligible for:
- PMI PDUs: 5
- Business Acumen PDUs: 2
- Ways of Working PDUs: 3
- IACET CEUs: 0.5 (Contact Hours: 5 hours)
- ATD CI Credits: 5
- HRCI Credits: 5
- SHRM PDCs: 5
Please Note:
Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEUs.
Notes
This course is offered through our curriculum partner, MindEdge, Inc. MindEdge was founded in 1998 by Harvard and MIT educators with a mission to improve the way the world learns. Since then, more than three million learners have participated in MindEdge programs.
Registered students will receive individualized communication with further instructions to help you prepare for class.