• Online, Self-Paced
Course Description

Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each.

Learning Objectives

SECFND: Cryptography

  • describe hash and encryption algorithms and how they are used to secure data
  • compare symmetric and asymmetric encryption algorithms and the benefits for each type

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support
  • Cybersecurity Management
  • Network Services