2 Videos | 54m 9s
- Includes Assessment
- Earns a Badge
Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each. This course can be used as part of the preparation for the 210-250: Understanding Cisco Cybersecurity Fundamentals certification exam.
WHAT YOU WILL LEARN
identify security benefits of using encryption algorithmsidentify the purpose of hashing algorithmspredict the behavior of hashes when related data is changeduse hash algorithms to obfuscate datacompare advantages of symmetric and asymmetric encryption algorithms
identify benefits of adding encryption algorithms to data setsidentify components of symmetric encryptionidentify differences between symmetric and asymmetric encryptionidentify encryption types
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platformDigital badges are yours to keep, forever.