The course introduces the student to the basics of encryption and decryption. Topics include the history of cryptology, the evolution of encryption and decryption methods, key management and security, message handling discipline, signals analysis and traffic analysis. The course also covers how to use currently available software to encrypt messages, create digital signatures, verify identities, etc. Steganography, microdots, covert inks and other techniques of hiding messages are also included.
Identify, describe, and critically evalu-ate information sources and applicable intelligence technologies to research aspects of technical surveillance
Appraise the threats, challenges, and issues related to the use of clandes-tine and secure communications
Analyze specific security applications for technical surveillance and research advantages, disadvantages, methods, etc.
Identify and explain the legal and ethi-cal issues raised by the use of clan-destine and secure communications
Develop general professional written and oral reports and presentations on the subject of clandestine and secure communications
To request an application or get information about any of our strategic security programs, fill out the form below. An Admissions Advisor will be in touch within one business day to answer your questions. Or contact us directly at 888-852-8746
email@example.com ext. 1