• Online, Self-Paced
Course Description

For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures.

Learning Objectives

0

Framework Connections

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.