IT&C 585
Download as PDF
Encryption Implementation
Electrical and Computer Engineering
Ira A. Fulton College of Engineering
Course Description
Encryption as a means for protecting data. How to implement encryption to accomplish security objectives. Selection of appropriate algorithms and protocols. Legal and regulatory requirements related to encryption.
When Taught
Fall
Fixed/Max
3
Fixed
2
Fixed
3
Recommended
Graduate status or sufficient cybersecurity experience from a course such as IT&C 366, IS 414, CS 465, or MATH 485.
Title
Encryption Application
Learning Outcome
Explain the purpose of encryption, including common security problems that encryption can solve and those security problems that are not appropriate for encryption.
Title
Encryption Key Management
Learning Outcome
Explain the importance of encryption key management in the security of the encryption implementation. Describe each phase of a key’s life and the security concerns for each.
Title
Implementation
Learning Outcome
Implement common industry encryption systems in controlled environments.
Title
Standards
Learning Outcome
Explain applicable industry standards and regulations governing implementation of encryption.