Enhance your skill setDevelop essential skills for thriving in real-world scenarios.
Stay focused, stay committedBoost your learning journey by enrolling: stay focused, consistent and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.
Training content
2
3
Once you have completed this Learning Path, you will be able to:
- Identify security controls based on cryptography (authentication, user authentication, integrity, non-repudiation).
- Classify primary cryptographic areas (symmetric ciphers, hash functions, digital signatures, asymmetric ciphers).
- Understand key exchange and management.
- Employ models of protection (network, application, data).
When you’re ready, click on the first step below to get started.
About the Author
QA, opens in a new tabTraining Provider
Students50,902
Labs185
Courses2,447
Learning paths47
A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.