Introduction to Cybersecurity
Completion requirements
Provides a foundational overview of how to protect digital devices, networks, and data from malicious attacks and organizational cyber hygiene.
2. Authentication and Cryptography
2.1. Encryption Basics
Encryption converts readable data into unreadable code to protect it from unauthorized access.
-
Symmetric encryption uses one key for both encryption and decryption.
-
Asymmetric encryption uses a public key to encrypt and a private key to decrypt.
-
Common algorithms: AES, RSA, DES.