• Online, Self-Paced
Course Description

Explore digital signatures and how to create and verify them. Examine public key infrastructure, when to use it, and common implementation designs. The role of cryptographic exchange on security investigations is also covered.

Learning Objectives

SECFND: Digital Signatures

  • create and verify a digital signature
  • describe the use and purpose of public key infrastructure (PKI) and the lifecycle of a certificate
  • describe how the success or failure of a cryptographic exchange can impact security

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Network Services