1. Home
  2. Training Library
  3. Keys & models of protection [CISMP]

Learning Path summary

Contents

keyboard_tab

The course is part of this learning path

Learning Path summary

Congratulations, you’ve completed this Learning Path on an Introduction to Cryptography.

Here’s a list of what you’ve covered so you can check your progress:

  • Security controls based on cryptography (authentication, user authentication, integrity, non-repudiation).
  • Primary cryptographic areas (symmetric ciphers, hash functions, digital signatures, asymmetric ciphers).
  • Key exchange and management.
  • Models of protection (network, application, data).

What’s next?

In the next Learning Path, you’ll learn how you can successfully implement effective physical and environmental controls in your workplace.

Difficulty
Beginner
Duration
13m
Students
61
Ratings
5/5
starstarstarstarstar
Description

This course describes how keys are generated, distributed, and managed for the purpose of encoding or decoding cryptographic data. Later, you’ll explore other methods of protection aside from cryptography, to give you a more well-rounded view of asset protection.

About the Author
Students
29741
Labs
125
Courses
1419
Learning Paths
37

A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.