In this module, you will identify basic encryption techniques and their applications while recognizing the distinctions among full-disk, partition, file, and volume encryption. You will describe the role of transport encryption and define the principles of Public Key Infrastructure (PKI), including the roles of Certificate Authorities (CAs) and various trust models. Additionally, you will explore the features of the Trusted Platform Module (TPM), Hardware Security Module (HSM), and Secure Enclave for data protection, as well as obfuscation techniques such as steganography, tokenization, and data masking