• Online, Self-Paced
Course Description
As the need to protect critical data increases, organizations must focus efforts on improving processes used to manage essential information. This course is designed to ensure software development teams employ appropriate techniques to manage identities, privileges, and secrets securely.

Learning Objectives

On successful completion of this course, learners should have the knowledge and skills to:

    Ensure approved cryptographic algorithms and methods are used for securing critical assets
  • Align key-management processes and procedures with those recognized by industry-standards bodies
  • Use Approved Random Number Generators| Providing strong entropy when Using Random Number Generator

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.