Cryptography

About

Many security controls are based on cryptographic systems and cryptography can assist in countering all these threats. This Lesson provides a basic understanding of what cryptography is and how it works through symmetric ciphers, hash functions, asymmetric ciphers, and digital signatures.

Learning objectives

The objectives of this Lesson are to provide you with and understanding of:

  • What cryptography is
  • How cryptography works through symmetric ciphers, hash functions, asymmetric ciphers, and digital signatures
  • Key exchange and management
  • Models of protection
  • Cryptanalysis

Intended audience

This Lesson is ideal for members of information security management teams, IT managers, security and systems managers, information asset owners and employees with legal compliance responsibilities. It acts as a foundation for more advanced managerial or technical qualifications.

Prerequisites

There are no specific pre-requisites to study this Lesson, however, a basic knowledge of IT, an understanding of the general principles of information technology security, and awareness of the issues involved with security control activity would be advantageous.

Feedback

We welcome all feedback and suggestions - please contact us at support@cloudacademy.com if you are unsure about where to start or if would like help getting started.

Unit UUID
Course UUID
QA
This content is developed in partnership with QA
Learn more