Skill

Types of Encryption, Protocols that Use Encryption

February 2024 with James Conrad

  • 5 videos
  • 59 mins
Join James Conrad as we learn the basics of turning information into a secret code so that only the people with the right key can understand it: encryption. We'll be looking at symmetric and asymmetric encryption methods, learning about diff

Recommended Experience
  • Basic familiarity with networking concepts and terminology
  • Awareness of common cybersecurity principles and practices
Related certifications
  • Cisco Certified Support Technician (CCST) Cybersecurity
Related Job Functions
  • IT support technician
  • Cybersecurity analyst
A former full-stack developer, Shaun Wassell brings a wealth of web development and programming experience to his training.
Get started
James Conrad
James Conrad
Trainer

Skill Outline

  1. 1. Asymmetric Encryption (10:17)
  2. 2. Hashing Data (14:06)

Quizzes & Practice Exams

Reinforce core concepts and new skills with built-in quiz questions, and exams.

Virtual Labs

Explore new technology and apply your expertise in customized virtual labs.

Free Flashcards

Flashcards help you reinforce what you’ve learned before exam day.

Learn this skill and so much more!

Get started

Gain instant access to our entire IT training library, free for your first week. Train anytime on your desktop, tablet, or mobile devices.

Not sure where to start?
Call 541-284-5522 or try our .

What is it like to train with us?

Our learners say it best.

Helps me learn the skills I need when I need them

THOMAS S. | SYSTEMS ENGINEER & CONSULTANT
Read Reviews
Get CBT Nuggets IT training news and resources

I have read and understood the privacy policy and am able to consent to it.

© 2026 CBT Nuggets. All rights reserved.Terms | Privacy Policy | Accessibility | | Sitemap | 2850 Crescent Avenue, Eugene, OR 97408 | 541-284-5522