Build hands-on tech skillsImprove theoretical and practical skills needed in real-world scenarios.
Stay focused, stay committedSupercharge your learning journey by enrolling, empowering you to stay focused, motivated, and achieve your goals with ease.
Earn a certificate of completionShow your skills and build your credibility when you include them in your resume and LinkedIn profile.
Training content
3
2
Once you have completed this Learning Path, you will be able to:
- Identify security controls based on cryptography (authentication, user authentication, integrity, non-repudiation).
- Classify primary cryptographic areas (symmetric ciphers, hash functions, digital signatures, asymmetric ciphers).
- Understand key exchange and management.
- Employ models of protection (network, application, data).
When you’re ready, click on the first step below to get started.


QATraining Provider
Students44173
Labs168
Courses1754
Learning Paths45
A world-leading tech and digital skills organization, we help many of the world’s leading companies to build their tech and digital capabilities via our range of world-class training courses, reskilling bootcamps, work-based learning programs, and apprenticeships. We also create bespoke solutions, blending elements to meet specific client needs.