Securing electronic communications is vital to ensuring that information is protected as it traverses the network. In this course, Cryptographic Algorithms, you’ll learn the basic differences between algorithms and their uses. First, you’ll explore symmetric key encryption. Next, you’ll discover asymmetric encryption. Finally, you’ll learn how to verify file integrity with hash algorithms. When you’re finished with this course, you’ll have the skills and knowledge of cryptographic algorithms needed to secure communication as it traverses a network.
Overview
Securing electronic communications is vital to ensuring that information is protected as it traverses the network. In this course, Cryptographic Algorithms, you’ll learn the basic differences between algorithms and their uses. First, you’ll explore symmetric key encryption. Next, you’ll discover asymmetric encryption. Finally, you’ll learn how to verify file integrity with hash algorithms. When you’re finished with this course, you’ll have the skills and knowledge of cryptographic algorithms needed to secure communication as it traverses a network.
Taught by
Matt Glass