Keys & models of protection [CISMP]
The course is part of this learning path
Learning Path summary
Congratulations, you’ve completed this Learning Path on an Introduction to Cryptography.
Here’s a list of what you’ve covered so you can check your progress:
- Security controls based on cryptography (authentication, user authentication, integrity, non-repudiation).
- Primary cryptographic areas (symmetric ciphers, hash functions, digital signatures, asymmetric ciphers).
- Key exchange and management.
- Models of protection (network, application, data).
In the next Learning Path, you’ll learn how you can successfully implement effective physical and environmental controls in your workplace.
This course describes how keys are generated, distributed, and managed for the purpose of encoding or decoding cryptographic data. Later, you’ll explore other methods of protection aside from cryptography, to give you a more well-rounded view of asset protection.
A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.