As the need to protect critical data increases, organizations must focus efforts on improving processes used to manage essential information. This course is designed to ensure software development teams employ appropriate techniques to manage identities, privileges, and secrets securely.
Learning Objectives
On successful completion of this course, learners should have the knowledge and skills to:
- Ensure approved cryptographic algorithms and methods are used for securing critical assets
- Align key-management processes and procedures with those recognized by industry-standards bodies
- Use Approved Random Number Generators| Providing strong entropy when Using Random Number Generator
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):