World's #1 Online Bootcamp






Course Highlights
- Introduction and History of Cryptography
- Symmetric Cryptography and Hashes
- Number Theory and Asymmetric Cryptography
- Applications of Cryptography
- Cryptanalysis
Course Description
Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding cryptography in some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.
This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. Basic knowledge of cryptanalysis is very beneficial to any penetration testing.
Exam Information
Below mentioned are the exam details for EC-Council Certified Encryption Specialist Course.
- Number of Questions: 50
- Test Format: Multiple Choice
- Test Duration: 2 Hours
- Passing Score: 70%
- Test Delivery: ECC EXAM, VUE
ECES Certification Objectives
Successful completion of the certification training empowers you with across the board understanding of:
- Types of Encryption Standards and their differences
- How to select the best standard for your organization
- How to enhance your pen-testing knowledge in encryption
- Correct and incorrect deployment of encryption technologies
- Common mistakes made in implementing encryption technologies
- Best practices when implementing encryption technologies
Course Content
ECES Certification course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. Basic knowledge of cryptanalysis is very beneficial to any penetration testing.
History
Mono-Alphabet Substitution
Caesar Cipher
Atbash Cipher
ROT 13
Scytale
Single Substitution Weaknesses
Multi-Alphabet Substitution
Cipher Disk
Vigenère Cipher
Vigenère Cipher: Example
Breaking the Vigenère Cipher
Playfair
The ADFGVX cipher
The Enigma Machine
CrypTool
nformation Theory
Information Theory Cryptography Concepts
Kerckhoffs’s Principle
Substitution
Transposition
Substitution and Transposition
Binary Math
Binary AND
Binary OR
Binary XOR
Block Cipher vs. Stream Cipher
Symmetric Block Cipher Algorithms
Footprinting Pen TestingBasic Facts of the Feistel Function
The Feistel Function
A Simple View of a Single Round
Unbalanced Feistel Cipher
DES
3DES
DESx
Whitening
AES
AES General Overview
AES Specifics
Blowfish
Serpent
Twofish
Skipjack
IDEA
Symmetric Algorithm Methods
Electronic Codebook (ECB)
Cipher-Block Chaining (CBC)
Propagating Cipher-Block Chaining (PCBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter (CTR)
Initialization Vector (IV)
Symmetric Stream Ciphers
Example of Symmetric Stream Ciphers: RC4
Example of Symmetric Stream Ciphers: FISH
Example of Symmetric Stream Ciphers: PIKE
Hash
Hash – Salt
MD5
The MD5 Algorithm
MD6
Secure Hash Algorithm (SHA)
Fork 256
RIPEMD – 160
GOST
Tiger
CryptoBench
Basic Number Facts
Prime Numbers
Co-Prime
Eulers Totient
Modulus Operator
Fibonacci Numbers
Birthday Problem
Birthday Theorem
Birthday Attack
Random Number Generators
Classification of Random Number Generators
Naor-Reingold and Mersenne Twister Pseudorandom Function
Linear Congruential Generator
Lehmer Random Number Generator
Lagged Fibonacci Generator
Diffie-Hellman
RSA – How it Works
Rivest Shamir Adleman (RSA)
RSA Example
Menezes–Qu–Vanstone
Signing with DSA
Elliptic Curve
What is a Digital Certificate?
Digital Certificates
X.509
X.509 Certificates
X.509 Certificate Content
X.509 Certificate File Extensions
Certificate Authority (CA)
Registration Authority (RA)
Public Key Infrastructure (PKI)
Digital Certificate Terminology
Server-based Certificate Validation Protocol
Digital Certificate Management
Trust Models
Certificates and Web Servers
Microsoft Certificate Services
Windows Certificates: certmgr.msc
Authentication
Password Authentication Protocol (PAP)
Shiva Password Authentication Protocol (S-PAP)
Challenge-Handshake Authentication Protocol (CHAP)
Kerberos
Components of Kerberos System
Pretty Good Privacy (PGP)
PGP Certificates
Wifi Encryption
Wired Equivalent Privacy (WEP)
WPA – Wi-Fi Protected Access
WPA2
SSL
TLS
Virtual Private Network (VPN)
Point-to-Point Tunneling Protocol (PPTP)
PPTP VPN
Layer 2 Tunneling Protocol VPN
Internet Protocol Security VPN
SSL/VPN
Encrypting Files
Backing up the EFS key
Restoring the EFS Key
Bitlocker
Bitlocker: Screenshot
Disk Encryption Software: Truecrypt
Steganography
Steganography Terms
Historical Steganography
Steganography Details
Other Forms of Steganography
Steganography Implementations
Demonstration
Steganalysis
Steganalysis – Raw Quick Pair
Steganalysis – Chi-Square Analysis
Steganalysis – Audio Steganalysis
Steganography Detection Tools
National Security Agency and Cryptography
NSA Suite A Encryption Algorithms
NSA Suite B Encryption Algorithms
National Security Agency: Type 1 Algorithms
National Security Agency: Type 2 Algorithms
National Security Agency: Type 3 Algorithms
National Security Agency: Type 4 Algorithms
Unbreakable Encryption
Cryptanalysis
Frequency Analysis
Kasiski
Cracking Modern Cryptography
Cracking Modern Cryptography: Chosen Plaintext Attack
Linear Cryptanalysis
Differential Cryptanalysis
Integral Cryptanalysis
Cryptanalysis Resources
Cryptanalysis Success
Rainbow Tables
Password Cracking
Tools
Tools Covered












Course Review
Read What People Say About Us


Khabir Othman
-
Very well designed courses. A must for all employees or anyone who uses internet to educate more in cybersecuirty field, and I got training is really useful as well as needed. Trainer took efforts to understand each concepts clearly and also helped to answer all questions. I found trainer is knowledgeable. It was best learning experience


durgesh rawat
-
Securium is a company that allows you to be productive and creative within your working hours. Here you can feel your work attach great value and you can learn more everyday. People are kind and HR are also supportive.This is a great place to grow your career, with the opportunity to make lots of connections that will serve you well. It's filled with very smart and humble people that know what they're doing and will push you to do and be more


Chabok A. Muhammed
-
Securium Solutions Pvt. Company is among the Best in class training center which i had many courses and specially CCISO, All the courses was excellent explained and delivered, The course material and core structure was amazing also turnaround of the assessment of my submission was very quick.


Vijay Kulkarni
-
I gone through CEH training via Securium and training is really useful as well as needed. Trainer took efforts to understand each concepts clearly and also helped to answer all questions. I found trainer is knowledgeable. It was best learning experience
FAQ
If you have queries related to our ECES Certification course, then below mentioned are a few of the FAQs that can make it easy for you to get a proper understanding of the same:

