ICT encryption

Description

The conversion of electronic data into a format which is readable only by authorized parties which use key encryption techniques, such as Public Key Infrastructure (PKI) and Secure Socket Layer (SSL).

Occupations requiring this skill

This section is generated automatically.

Skill demand overview
  • Essential in 0 occupations
  • Optional in 5 occupations
  • Total: 5 occupations
  • Most common in: ISCO major group 2 (Professionals)

Optional for

  • ICT security administrator
    ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption. Other titles The…
  • Digital forensics expert
    Digital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted o…
  • ICT technician
    ICT technicians install, maintain, repair and operate information systems and any ICT related equipment (laptops, desktops, servers, tablets, smart phones, communications equipment…
  • Ethical hacker
    Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
  • ICT security technician
    ICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awarenes…

Related skills

 
Last updated on February 19, 2026

Create an account to contribute and get credited

Thousands of people read these job profiles every month.
Add your experience and help make careers clearer for everyone.