• Online, Self-Paced
Course Description

Enterprise assets, including data, must be protected at all times. Explore cryptography best practices, including hashing, salting, encryption, digital signatures, regulatory requirements, PKI, and Web of Trust.

Learning Objectives

{"describe purpose and best practices for applying hashing"}

Framework Connections

  • Cyber Operational Planning
  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Executive Cyber Leadership
  • Systems Analysis
  • Systems Development
  • Threat Analysis
  • Vulnerability Assessment and Management