Call 1 (201) 549-9007 (US) | +91 - 931-062-4042 (WhatsApp) Email: [email protected]

Certified Encryption Specialist (ECES) Training and Certification

3580+ Satisfied learners

The EC-Council Certified Encryption Specialist, ECES Training program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. This ECES Training and Certification course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. Basic knowledge of cryptanalysis is very beneficial to any penetration testing.

World's #1 Online Bootcamp

ECES Certification Training Schedule

INSTRUCTOR:

SAM NIVETHAN V J
Security Analyst and Infosec Trainer Expert in Risk Management and a Active Security researcher fond of Enlightening others about the Importance of Security and its need in Digital Space. Over his Experience he Taught more 200+ Batches all around the Globe.

INSTRUCTOR:

AAKASH THAKUR
Offensive Security Certified Trainer and Risk Assessment specialist in Securium Solutions plays important role in Educating others about the Risk associated with the Digital World. Expertise in Forensics, R&D helps Corporates and Students to gain more n more from his Trainings.

Course Description

Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding cryptography in some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. Basic knowledge of cryptanalysis is very beneficial to any penetration testing.

    Request more information








    By providing your contact details, you agree to our Privacy Policy

    Exam Information

    Below mentioned are the exam details for EC-Council Certified Encryption Specialist Course.

    • Number of Questions: 50
    • Test Format: Multiple Choice
    • Test Duration: 2 Hours
    • Passing Score: 70%
    • Test Delivery: ECC EXAM, VUE

    ECES Certification Objectives

    Successful completion of the certification training empowers you with across the board understanding of:

    • Types of Encryption Standards and their differences
    • How to select the best standard for your organization
    • How to enhance your pen-testing knowledge in encryption
    • Correct and incorrect deployment of encryption technologies
    • Common mistakes made in implementing encryption technologies
    • Best practices when implementing encryption technologies

    Course Content

    ECES Certification course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. Basic knowledge of cryptanalysis is very beneficial to any penetration testing.

    What is Cryptography?
    History
    Mono-Alphabet Substitution
    Caesar Cipher
    Atbash Cipher
    ROT 13
    Scytale
    Single Substitution Weaknesses
    Multi-Alphabet Substitution
    Cipher Disk
    Vigenère Cipher
    Vigenère Cipher: Example
    Breaking the Vigenère Cipher
    Playfair
    The ADFGVX cipher
    The Enigma Machine
    CrypTool
    Symmetric Cryptography
    nformation Theory
    Information Theory Cryptography Concepts
    Kerckhoffs’s Principle
    Substitution
    Transposition
    Substitution and Transposition
    Binary Math
    Binary AND
    Binary OR
    Binary XOR
    Block Cipher vs. Stream Cipher
    Symmetric Block Cipher Algorithms
    Footprinting Pen TestingBasic Facts of the Feistel Function
    The Feistel Function
    A Simple View of a Single Round
    Unbalanced Feistel Cipher
    DES
    3DES
    DESx
    Whitening
    AES
    AES General Overview
    AES Specifics
    Blowfish
    Serpent
    Twofish
    Skipjack
    IDEA
    Symmetric Algorithm Methods
    Electronic Codebook (ECB)
    Cipher-Block Chaining (CBC)
    Propagating Cipher-Block Chaining (PCBC)
    Cipher Feedback (CFB)
    Output Feedback (OFB)
    Counter (CTR)
    Initialization Vector (IV)
    Symmetric Stream Ciphers
    Example of Symmetric Stream Ciphers: RC4
    Example of Symmetric Stream Ciphers: FISH
    Example of Symmetric Stream Ciphers: PIKE
    Hash
    Hash – Salt
    MD5
    The MD5 Algorithm
    MD6
    Secure Hash Algorithm (SHA)
    Fork 256
    RIPEMD – 160
    GOST
    Tiger
    CryptoBench
    Asymmetric Encryption
    Basic Number Facts
    Prime Numbers
    Co-Prime
    Eulers Totient
    Modulus Operator
    Fibonacci Numbers
    Birthday Problem
    Birthday Theorem
    Birthday Attack
    Random Number Generators
    Classification of Random Number Generators
    Naor-Reingold and Mersenne Twister Pseudorandom Function
    Linear Congruential Generator
    Lehmer Random Number Generator
    Lagged Fibonacci Generator
    Diffie-Hellman
    RSA – How it Works
    Rivest Shamir Adleman (RSA)
    RSA Example
    Menezes–Qu–Vanstone
    Signing with DSA
    Elliptic Curve
    Digital Signatures
    What is a Digital Certificate?
    Digital Certificates
    X.509
    X.509 Certificates
    X.509 Certificate Content
    X.509 Certificate File Extensions
    Certificate Authority (CA)
    Registration Authority (RA)
    Public Key Infrastructure (PKI)
    Digital Certificate Terminology
    Server-based Certificate Validation Protocol
    Digital Certificate Management
    Trust Models
    Certificates and Web Servers
    Microsoft Certificate Services
    Windows Certificates: certmgr.msc
    Authentication
    Password Authentication Protocol (PAP)
    Shiva Password Authentication Protocol (S-PAP)
    Challenge-Handshake Authentication Protocol (CHAP)
    Kerberos
    Components of Kerberos System
    Pretty Good Privacy (PGP)
    PGP Certificates
    Wifi Encryption
    Wired Equivalent Privacy (WEP)
    WPA – Wi-Fi Protected Access
    WPA2
    SSL
    TLS
    Virtual Private Network (VPN)
    Point-to-Point Tunneling Protocol (PPTP)
    PPTP VPN
    Layer 2 Tunneling Protocol VPN
    Internet Protocol Security VPN
    SSL/VPN
    Encrypting Files
    Backing up the EFS key
    Restoring the EFS Key
    Bitlocker
    Bitlocker: Screenshot
    Disk Encryption Software: Truecrypt
    Steganography
    Steganography Terms
    Historical Steganography
    Steganography Details
    Other Forms of Steganography
    Steganography Implementations
    Demonstration
    Steganalysis
    Steganalysis – Raw Quick Pair
    Steganalysis – Chi-Square Analysis
    Steganalysis – Audio Steganalysis
    Steganography Detection Tools
    National Security Agency and Cryptography
    NSA Suite A Encryption Algorithms
    NSA Suite B Encryption Algorithms
    National Security Agency: Type 1 Algorithms
    National Security Agency: Type 2 Algorithms
    National Security Agency: Type 3 Algorithms
    National Security Agency: Type 4 Algorithms
    Unbreakable Encryption
    Breaking Ciphers
    Cryptanalysis
    Frequency Analysis
    Kasiski
    Cracking Modern Cryptography
    Cracking Modern Cryptography: Chosen Plaintext Attack
    Linear Cryptanalysis
    Differential Cryptanalysis
    Integral Cryptanalysis
    Cryptanalysis Resources
    Cryptanalysis Success
    Rainbow Tables
    Password Cracking
    Tools

      Request more information








      By providing your contact details, you agree to our Privacy Policy

      Course Review

      Read What People Say About Us

      FAQ

      If you have queries related to our ECES Certification course, then below mentioned are a few of the FAQs that can make it easy for you to get a proper understanding of the same:

      Training Options

      online Bootcamp

      • 90 days of flexible access to online classes
      • Lifetime access to high-quality live class recordings
      • 24x7 learner assistance and support
      • Classes starting from:-
      First Batch: 28th Nov
      Second Batch: 12th Dec

      Corporate Training

      Customized to your team's needs

      • Blended learning delivery model (self-paced eLearning and/or instructor-led options)
      • Flexible pricing options
      • Enterprise grade Learning Management System (LMS)
      • Enterprise dashboards for individuals and teams
      • 24x7 learner assistance and support
      X