25.10.20
This website uses cookies to ensure you get the best experience on our website. Learn more

Credentials from

Internet Society Directory
May 25, 2025
May 25, 2025
History of Encryption Practices
Preview image for credential History of Encryption Practices
History of Encryption Practices
  • Evolution of encryption practices
  • Government involvement in encryption
  • Back-door access to encrypted products
May 25, 2025
May 25, 2025
Advocacy for Encryption
Preview image for credential Advocacy for Encryption
Advocacy for Encryption
  • Encryption advocacy
  • How to become an encryption advocate
  • Structuring advocacy messaging by audience
May 25, 2025
May 25, 2025
Threats to Encryption
Preview image for credential Threats to Encryption
Threats to Encryption
  • Types of threats to encryption
  • Methods that enable access to encrypted data
  • Methods that involve access to users’ data before encryption or after decryption
May 25, 2025
May 25, 2025
What is Encryption?
Preview image for credential What is Encryption?
What is Encryption?
  • Encryption definition
  • How encryption protects your data
  • Symmetric and asymmetric encryption
  • End-to-end encryption communication
May 25, 2025
May 25, 2025
Encryption in Use
Preview image for credential Encryption in Use
Encryption in Use
  • Data in transit
  • End-to-end encryption
  • Link layer security
  • Transport layer security
May 25, 2025
May 25, 2025
Encryption Certificate
Preview image for credential Encryption Certificate
Encryption Certificate
  • Describe encryption concepts at a high level, and the benefits encryption offers to us individually and as a society.
  • Find out why it is important, and the ways in which we rely upon strong encryption in our daily lives.
  • Understand how and why efforts to weaken encryption pose a serious threat.
  • Learn about various “backdoor access” proposals and why they are problematic.
  • Learn about the Internet Society’s goals and activities related to supporting strong encryption and defending against threats to it.
  • Discover what actions you can take to advocate for strong encryption in your community and beyond.