INT 460 Clandestine and Secure Communications

The course introduces the student to the basics of encryption and decryption. Topics include the history of cryptology, the evolution of encryption and decryption methods, key management and security, message handling discipline, signals analysis and traffic analysis. The course also covers how to use currently available software to encrypt messages, create digital signatures, verify identities, etc. Steganography, microdots, covert inks and other techniques of hiding messages are also included.

The course learning outcomes that you will demonstrate upon completion of this course are as follows:

Identify, describe, and critically evalu-ate information sources and applicable intelligence technologies to research aspects of technical surveillance

Appraise the threats, challenges, and issues related to the use of clandes-tine and secure communications

Analyze specific security applications for technical surveillance and research advantages, disadvantages, methods, etc.

Identify and explain the legal and ethi-cal issues raised by the use of clan-destine and secure communications

Develop general professional written and oral reports and presentations on the subject of clandestine and secure communications

Don’t hesitate to reach out!

Henley-Putnam’s commitment to service begins with your first call with an advisor and continues through graduation. Our classes are small, so you are never just a number. We get to know you, your goals and your needs. You will be supported by a team of professionals who will help you track your degree progression, advise you on course selection, and inform you of relevant services such as tutoring and mentoring. Your faculty members will be available to you, as will the deans and administrators.

To request an application or get information about any of our programs, fill out the form below. An advisor will be in touch to answer your questions. Or contact us directly at 855-246-7440 or HenleyPutnam@national.edu