• Online, Self-Paced
Course Description

Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. Discover network protection techniques, including cryptography, biometrics, hashing, and authentication.

Learning Objectives

{"recognize how crypto is used to secure data in the enterprise"}

Framework Connections