ENG 125: Essential Data Protection
This course provides essential guidance to information system managers, information security managers, system designers and developers on implementing cryptographic controls at the information systems level to facilitate compliance with applicable regulatory requirements.
Topics covered in this course include:
- Asymmetric key algorithms
- Using hash functions to protect data integrity and store passwords for authentication purposes
- Encrypting file transfers, file downloads, adding salt values before hashing
- Using Certificate Authorities