Course Description
Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each.
Learning Objectives
SECFND: Cryptography
- describe hash and encryption algorithms and how they are used to secure data
- compare symmetric and asymmetric encryption algorithms and the benefits for each type