Loading...

Course Description

Course Description

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. This course also features a number of fictional scenarios based on cryptography to help you apply the concepts to situations you may see in the real world. This course requires some basic understanding of IT concepts.

This course is part of the Cybersecurity suite of courses. However, the course can be taken as a stand-alone course.


Learning Outcomes

  • Understand how cryptography works and its role in information security
  • Compare and contrast different ciphers and explain how they work
  • Create substitution ciphers and encode and decode cleartext and ciphertext
  • Discuss how encryption enables secure transmission of sensitive data
  • Explain and compare symmetric and asymmetric cryptography
  • Describe the role of public key infrastructure and key management
  • Apply concepts and knowledge to real-world scenarios that involve cryptographic challenges

Key Features

  • Expert-supported
  • Mobile-friendly
  • Accessible
  • Badge and credit-awarding
  • Games & Flashcards
  • Video content
  • Real-world case studies
  • Audio-enabled in app

Refund Policy

You may request a refund up to 5 days from the purchase date. The registration fee will only be refunded if less than 10% of the course has been completed. Completion percentage can be viewed on the Course Progress page from within the course.


Notes

Estimated time to complete: 5 hours

This course has an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.

This course does not require any additional purchases of supplementary materials.

Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEUs. Learners will have three attempts at all graded assessments.

Project Management Institute, PMI, the Registered Education Provider logo, Project Management Professional, PMP, Project Management Body of Knowledge, PMBOK, PMI Agile Certified Practitioner, PMI-ACP, PMI Risk Management Professional, PMI-RMP, the PMI Talent Triangle, and the PMI Talent Triangle logo are marks of the Project Management Institute, Inc.

Information in this course has been taken from A Guide to the Project Management Body of Knowledge, (PMBOK® Guide) — Sixth Edition, Project Management Institute Inc., 2017.

The following list outlines the PDUs you will earn for completing this course, based on the certification you have.

  • PMP®/PgMP®
    • Technical: 3
    • Leadership: 0
    • Strategic/Business: 2
    • TOTAL: 5
  • PMI-RMP®
    • Technical: 3
    • Leadership: 0
    • Strategic/Business: 2
    • TOTAL: 5
  • PMI-SP®
    • Technical: 0
    • Leadership: 0
    • Strategic/Business: 2
    • TOTAL: 2
  • PMI-ACP®
    • Technical: 3
    • Leadership: 0
    • Strategic/Business: 2
    • TOTAL: 5
  • PfMP®
    • Technical: 0
    • Leadership: 0
    • Strategic/Business: 2
    • TOTAL: 2
  • PMI-PBA®
    • Technical: 0
    • Leadership: 0
    • Strategic/Business: 2
    • TOTAL: 2

Applies Towards the Following Certificates

Loading...
Enrollment Information
Course
Cryptography Scenarios
Schedule
Self-Paced
Format
Course Fee
Tution non-credit $79.00
Reading List / Textbook
No
Required fields are indicated by .