• Online, Self-Paced
Course Description

This course introduces cryptography and how cryptography can help secure applications and data. It also provides an overview of common uses of cryptography. After completing this course, you will be able to identify the various cryptographic technologies that are relevant to software solutions. You will also be able to identify several common data-in-motion cryptographic security applications, and identify several common data-at-rest cryptographic security applications.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Identify relevant cryptographic technologies
  • Identify several common data-in-motion cryptographic security applications
  • Identify several common data-at-rest cryptographic security applications

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.