Explora nuestro catálogo interactivo de cursos y lleva tu desarrollo profesional al siguiente nivel. 📚✨
Here certified technical trainer Ryan Hendricks elucidates the world of cryptography and how IT professionals can use it to support security and confidentiality. Hendricks will explain common encryption algorithms as well as use cases for both symmetric and asymmetric encryption. This course will demonstrate how security certificates work and are validated and also show how hashing algorithms can be used in a production environment.
Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.
Audio Languages | |
---|---|
Content Style | |
Primary Competency | |
Content Features | |
Course Text Languages | |
Subtitle Languages | |
Seat Time |
© 2025 Escal8. Todos los derechos reservados.