• Online, Self-Paced
Course Description

In this course, you will learn about best practices for implementing strong cryptography to protect mobile applications and their data.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Identify the main security objectives supported by strong cryptography
  • Summarize how strong cryptography supports each of them
  • Determine when to use each cryptographic technique
  • Explain why strong randomness is integral to strong cryptography
  • Apply cryptography best practices

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.