• Online, Self-Paced
Course Description

Authentication controls who gets access to resources. Stronger authentication means greater control over resource access. Discover network protection techniques, including cryptography, biometrics, hashing, and authentication.

Learning Objectives

{"recognize how crypto is used to secure data in the enterprise"}

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Operational Planning
  • Cyber Operations
  • Cyber Defense Analysis
  • Cybersecurity Management
  • Executive Cyber Leadership
  • Threat Analysis