CYBR463 — Applied Cryptography

3 credits Catalog-Derived

Modern cryptography including symmetric and asymmetric cryptosystems, secure hash functions, digital signatures, and PKI.

5
Objectives
40
Matches
40
Reviewed
12
Occupations
Your experience with this course
Top occupation matches for this course
72.8% Blockchain Engineers 7t
50.3% Mathematicians 5t
41.5% Information Security Analysts 4t
39.7% Computer Systems Engineers/Architec 3t
43.5% Information Security Engineers 3t

Learning Objectives & Matches

LO1

Implement cryptographic algorithms including AES, RSA, and elliptic curve cryptography

10 O*NET task matches
Batch:
Blockchain Engineers
60% ok

Design and verify cryptographic protocols to protect private information.

Claude Opus 4.6 denied
Mathematicians 2.8/5
50% ok

Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.

Claude Opus 4.6 denied
Web Developers
48% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Biostatisticians 4.2/5
45% ok

Develop or implement data analysis algorithms.

Claude Opus 4.6 denied
Information Security Engineers 4.1/5
44% ok

Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.

Claude Opus 4.6 approved at 100
Information Security Engineers 3.9/5
43% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 approved at 100
Web Administrators 4.2/5
43% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Information Security Analysts 4.2/5
40% ok

Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.

Claude Opus 4.6 denied
Blockchain Engineers
40% ok

Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
40% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 denied
LO2

Apply public key infrastructure (PKI) and certificate management for secure communications

10 O*NET task matches
Batch:
Blockchain Engineers
52% ok

Design and verify cryptographic protocols to protect private information.

Claude Opus 4.6 denied
Web Developers
37% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Mathematicians 2.8/5
36% ok

Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.

Claude Opus 4.6 denied
Web Administrators 4.2/5
35% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Information Security Engineers 3.9/5
35% ok

Develop information security standards and best practices.

Claude Opus 4.6 denied
Information Security Engineers 3.9/5
34% ok

Identify or implement solutions to information security problems.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
34% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 denied
Information Security Analysts 4.2/5
31% ok

Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.

Claude Opus 4.6 denied
Blockchain Engineers
31% ok

Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.

Claude Opus 4.6 denied
Information Security Engineers 4.1/5
31% ok

Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.

Claude Opus 4.6 denied
LO3

Use secure hash functions including SHA-256 for data integrity verification

10 O*NET task matches
Batch:
Blockchain Engineers
45% ok

Design and verify cryptographic protocols to protect private information.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
35% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 denied
Blockchain Engineers
34% ok

Assess blockchain threats, such as untested code and unprotected keys.

Claude Opus 4.6 denied
Database Administrators 3.9/5
33% ok

Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure.

Claude Opus 4.6 denied
Network and Computer Systems A 3.7/5
33% ok

Plan, coordinate, and implement network security measures to protect data, software, and hardware.

Claude Opus 4.6 denied
Web Administrators 4.2/5
33% ok

Implement Web site security measures, such as firewalls or message encryption.

Claude Opus 4.6 denied
Information Security Engineers 4.1/5
32% ok

Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.

Claude Opus 4.6 denied
Web Developers
32% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Blockchain Engineers
32% ok

Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.

Claude Opus 4.6 denied
Information Security Analysts 3.8/5
31% ok

Train users and promote security awareness to ensure system security and to improve server and network efficiency.

Claude Opus 4.6 denied
LO4

Design and implement cryptographic protocols for authentication and key exchange

10 O*NET task matches
Batch:
Blockchain Engineers
73% ok

Design and verify cryptographic protocols to protect private information.

Claude Opus 4.6 denied
Blockchain Engineers
55% ok

Design and deploy blockchain design patterns to make transactions secure, transparent, and immutable.

Claude Opus 4.6 denied
Mathematicians 2.8/5
50% ok

Design, analyze, and decipher encryption systems designed to transmit military, political, financial, or law-enforcement-related information in code.

Claude Opus 4.6 denied
Web Developers
45% ok

Design and implement Web site security measures, such as firewalls and message encryption.

Claude Opus 4.6 denied
Blockchain Engineers
43% ok

Design and develop blockchain technologies for industries such as finance and music.

Claude Opus 4.6 denied
Information Security Analysts 4.2/5
41% ok

Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.

Claude Opus 4.6 denied
Penetration Testers
40% ok

Design security solutions to address known device vulnerabilities.

Claude Opus 4.6 denied
Web Administrators 4.5/5
39% ok

Identify, standardize, and communicate levels of access and security.

Claude Opus 4.6 denied
Computer Systems Engineers/Arc 4.2/5
38% ok

Provide customers or installation teams guidelines for implementing secure systems.

Claude Opus 4.6 denied
Computer and Information Resea 3.6/5
37% ok

Design computers and the software that runs them.

Claude Opus 4.6 denied
LO5

Implement digital signatures for message authentication and non-repudiation

0 O*NET task matches
Batch:
No O*NET task matches for this objective.
Source: Derived from EWU catalog · Matches via cosine similarity (all-MiniLM-L6-v2, 384-dim embeddings)