Introduction to Cybersecurity
Completion requirements
Provides a foundational overview of how to protect digital devices, networks, and data from malicious attacks and organizational cyber hygiene.
2. Authentication and Cryptography
2.2. Digital Signatures
Digital signatures verify the authenticity and integrity of a message or document.
-
Created using the sender’s private key.
-
Verified using the sender’s public key.
-
Ensures the message hasn’t been altered and confirms the sender’s identity.