Explore how crypto algorithms are used to help secure data in a digital environment, including the use of hash and encryption algorithms. Discover the differences between symmetric and asymmetric key encryption and when to use each.
- describe hash and encryption algorithms and how they are used to secure data
- compare symmetric and asymmetric encryption algorithms and the benefits for each type
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.