Summary
During the course of this chapter, you learned about the importance of cryptography and the vital role it plays in the field of information security and assurance. Furthermore, you discovered the key elements that cryptography provides on a network, such as origin authentication, data integrity, and confidentiality. You also acquired the skills and knowledge to identify various types of encryption ciphers and hashing algorithms. Lastly, you explored the need for PKI on the internet and saw how it helps users to verify the identity of a host on an untrusted network.
I hope that this chapter has been informative for you and will prove beneficial in your journey toward learning the foundations of cybersecurity operations and gaining your Cisco Certified CyberOps Associate certification. In the next chapter, you will learn about the elements of endpoint security on host devices, and understand how to use the built-in tools within Windows and Linux operating systems to perform...