Course DescriptionThis course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered. This course requires a basic understanding of IT concepts.
After completing this course, you will be able to:
- Understand how cryptography works and its role in information security
- Compare and contrast different ciphers and explain how they work
- Create substitution ciphers and encode and decode cleartext and ciphertext
- Discuss how encryption enables secure transmission of sensitive data
- Explain and compare symmetric and asymmetric cryptography
- Describe the role of public key infrastructure and key management
Upon completion of the course, learners may be eligible for:
- PMI PDUs: 5
- Business Acumen PDUs: 2
- Ways of Working PDUs: 3
- IACET CEUs: 0.5 (Contact Hours: 5 hours)
- HRCI Credits: 5 (Type: Specified - Strategic Business)
- SHRM PDCs: 5
Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEUs.
This course is offered through our curriculum partner, MindEdge, Inc. MindEdge was founded in 1998 by Harvard and MIT educators with a mission to improve the way the world learns. Since then, more than three million learners have participated in MindEdge programs.
Registered students will receive individualized communication with further instructions to help you prepare for class.