Completion requirements
Authentication was discussed in the previous section. This section will discuss different cryptographic methods to provide for authentication to include symmetric and asymmetric authentication. After watching, you should be able to explain authentication, the risks of impersonation, and be able to define certificates and certificate authorities.
Source: https://www.youtube.com/watch?v=PjmdZTyp5z0 This work is licensed under a Creative Commons Attribution 3.0 License.
Last modified: Friday, 26 July 2024, 1:20 PM