CryptographyLearn how cryptography is used to secure data, including encryption, hashing and public key infrastructure.
Course descriptionExplore the secrets of cryptography and data protection! This course will help you understand the differences between things like encryption, hashing and certificates, making it easier for you to understand the intricacies of data protection.
Video - 00:12:00
Learn about public key infrastructure (PKI).
Encryption and Hashing
Video - 00:03:00
Learn about encryption and hashing methods.
Plans & pricing
- Team administration and reporting
- Dedicated client success manager
Single sign-on (SSO)
Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
Integrations via API
Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
- 190+ role-guided learning paths and assessments (e.g., Incident Response)
- 100s of hands-on labs in cloud-hosted cyber ranges
- Create and assign custom learning paths
- Custom certification practice exams (e.g., CISSP, CISA)
- Optional upgrade: Guarantee team certification with live boot camps