Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)OST B Discussion Lesson 05

#98026
Erin Kesterson
Participant

There is many different types but the most common ones are Symmetric which is also know for a hidden key or a secret key Encryption this is mostly used for mobile devices some uses it on computers. The purpose for this is so that if you’re in somewhere and people are trying to get ur passwords or pull up messages they won’t be able to because symmetric is between your device and the device you are connected to.
Asymmetric Encryption it is nothing like Symmetric that uses one key. Asymmetric uses different keys to lock the passage into another device. That way only the key hold and the one other person can pull and perform actions and have the access to the advancement of functions it’s a lot like the RSA and ECC.
Hashing is a unique identifier, and it transforms data size and length that is fixed to an output known as hash value. it processes though a complex procedure and produces a distinct output for input data.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.