
Blue Team: Using Encryption for Product Security
About this Experience
A cybersecurity analyst needs to master the fundamentals of ethical hacking. One practice is to role play as the red team (simulating a cyberattack) or as the blue team (maintaining system defenses during a hack). By working together red and blue teams provide a holistic security solution to defend a product and its affiliated data against evolving threats.
What You Will Do
In this Shadow Session you will watch the blue team responsible for defending a FinTech product develop a plan to protect financial records “upstream” through encryption. You will witness how the blue team determines which stage in the user journey to mount an encryption defense to ensure maximum effect without compromising the user’s experience.
What You Will Get
Who Will Support You
In this learning experience, you’ll receive guidance from working professionals currently working in the field of Cybersecurity. They’ll share their knowledge, expertise, and experience to help you understand how the challenge is approached in the real world. You’ll also connect with and learn from peer learners all seeking to explore new careers together.

What You Will Learn
In this experience, you will learn to:
- Incorporate encryption as a product feature
- Weigh the opportunities and tradeoffs of different defense strategies
- Design a security solution that meets competing needs of multiple stakeholders
Why Clicked is Different
