From the course: Learning Cryptography and Network Security

Keeping information safe

Today, much of our data is stored electronically, making secure storage and transmission critical for individuals and businesses. In this course, you'll understand the various cryptographic techniques that provide data confidentiality, integrity, authentication, and accountability. Hello, I'm Lisa Bock, and I'm a security ambassador. Join me as we explore symmetric and asymmetric encryption, along with hash functions and the public key infrastructure that safeguard network communications and data, whether in motion or at rest. Are you ready? Let's get started.

Contents