This course introduces cryptography and how cryptography can help secure applications and data. It also provides an overview of common uses of cryptography. After completing this course, you will be able to identify the various cryptographic technologies that are relevant to software solutions. You will also be able to identify several common data-in-motion cryptographic security applications, and identify several common data-at-rest cryptographic security applications.
On successful completion of this course, learners should have the knowledge and skills to:
- Identify relevant cryptographic technologies
- Identify several common data-in-motion cryptographic security applications
- Identify several common data-at-rest cryptographic security applications
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.