• Online, Self-Paced
Course Description

In this course, you will learn how to mitigate the risks associated with Insufficient Cryptography which includes threat agents such as anyone with physical access to data that has been encrypted improperly, or mobile malware acting on an adversary's behalf.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

  • Identify the most common security flaws in mobile apps related to insufficient cryptography
  • Understand how an attacker might exploit such vulnerabilities in your software
  • Eliminate or mitigate exposure to these common security threats

 

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Risk Management
  • Software Development

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.