Password Protected
Nope
Yep, that's right!
Career Guidance Knowledge information and communication technologies (icts) K061 - information and communication technologies (icts) K0612 - database and network design and administration ICT encryption
Description
The conversion of electronic data into a format which is readable only by authorized parties which use key encryption techniques, such as Public Key Infrastructure (PKI) and Secure Socket Layer (SSL).
Occupations requiring this skill
This section is generated automatically.
Skill demand overview
- Essential in 0 occupations
- Optional in 5 occupations
- Total: 5 occupations
- Most common in: ISCO major group 2 (Professionals)
Optional for
- ICT security administratorICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption. Other titles The…
- Digital forensics expertDigital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted o…
- ICT technicianICT technicians install, maintain, repair and operate information systems and any ICT related equipment (laptops, desktops, servers, tablets, smart phones, communications equipment…
- Ethical hackerEthical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vuln…
- ICT security technicianICT security technicians propose and implement necessary security updates and measures whenever is required. They advise, support, inform and provide training and security awarenes…
Related skills
- Identify ICT system weaknesses
- ICT security legislation
- ICT network security risks
- ICT security standards
- Cyber security
- Remove computer virus or malware from a computer
- Manage IT security compliances
- Cyber attack counter-measures
- Use scripting programming
- Solve ICT system problems
- ICT infrastructure
- Penetration testing tool
Last updated on February 19, 2026
