Cryptography Scenarios


          Start Today!

          Add to cart

          Professional Credits:

          CEU: 0.5
          ATD CI: 5
          HRCI: 5
          SHRM: 5


          Start Today!

          Add to cart

          Completion Time

          5 hours

          Access Time

          90 Days


          Individual Skill Course



          Training Level


          Delivery Information:

          Online Asynchronous Self-paced


          This training course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.

          Learning Outcomes

          After completing this course, the learner should be able to:
          • Understand how cryptography works and its role in information security
          • Compare and contrast different ciphers and explain how they work
          • Create substitution ciphers and encode and decode cleartext and ciphertext
          • Discuss how encryption enables secure transmission of sensitive data
          • Explain and compare symmetric and asymmetric cryptography
          • Describe the role of public key infrastructure and key management
          • Apply concepts and knowledge to real-world scenarios that involve cryptographic challenges


          Start Today!
          Add to cart