5910 Breckenridge Pkwy Suite B, Tampa, FL. 33610
(800) 272-0707

SkillSoft Explore Course

Collections     Cybersecurity Collection     Cisco     ITPro.TV - Understanding Cisco Cybersecurity Fundamentals

Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each.



Objectives

SECFND: Cryptography

  • describe hash and encryption algorithms and how they are used to secure data
  • compare symmetric and asymmetric encryption algorithms and the benefits for each type