• Online, Self-Paced
Course Description

Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each.

Learning Objectives

SECFND: Cryptography

  • describe hash and encryption algorithms and how they are used to secure data
  • compare symmetric and asymmetric encryption algorithms and the benefits for each type

Framework Connections