Cisco SECFND | Beginner
- 2 Videos | 54m 9s
- Includes Assessment
- Earns a Badge
Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
WHAT YOU WILL LEARN
identify security benefits of using encryption algorithmspredict the behavior of hashes when related data is changedidentify the purpose of hashing algorithmsuse hash algorithms to obfuscate datacompare advantages of symmetric and asymmetric encryption algorithms
identify benefits of adding encryption algorithms to data setsidentify encryption typesidentify components of symmetric encryptionidentify differences between symmetric and asymmetric encryption
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.