Once you have completed this Learning Path, you will be able to:
- Identify security controls based on cryptography (authentication, user authentication, integrity, non-repudiation).
- Classify primary cryptographic areas (symmetric ciphers, hash functions, digital signatures, asymmetric ciphers).
- Understand key exchange and management.
- Employ models of protection (network, application, data).
When you’re ready, click on the first step below to get started.
A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.