SECFND: Cryptography

Cisco SECFND    |    Beginner
  • 2 Videos | 54m 9s
  • Includes Assessment
  • Earns a Badge
Likes 7 Likes 7
Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.

WHAT YOU WILL LEARN

  • identify security benefits of using encryption algorithms
    identify the purpose of hashing algorithms
    predict the behavior of hashes when related data is changed
    use hash algorithms to obfuscate data
    compare advantages of symmetric and asymmetric encryption algorithms
  • identify benefits of adding encryption algorithms to data sets
    identify components of symmetric encryption
    identify differences between symmetric and asymmetric encryption
    identify encryption types

IN THIS COURSE

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 7 Likes 7  
Likes 7 Likes 7