Mile2 Cybersecurity Certifications

Reply To: OCU C)ISSO D Discussion Lesson 08

Kevin Mehok

Hey Kelly,

Great job. You listed clear examples of both Symmetric Cryptography and Asymmetric cryptography. The irony is key, lol, yes, the ‘key’ for encryption. To me, the lock calling for the pair in asymmetric cryptography which regulates, if you will, private and public.

Thanks for your post.

God Bless,



Please Note:

The support ticket system is for technical questions and post-sale issues.


If you have pre-sale questions please use our chat feature or email .