About Course

As the size and frequency of data breaches increasing over time, more and more organizations are rapidly recognizing that encryption is no longer an option. They are busy formulating comprehensive strategy and shifting their stance towards encryption technologies and rapidly deploying a range of technologies to defend and protect their sensitive data from internal and external threats. Increasingly, business users are influencing the adoption of encryption technologies more than IT operations teams.

Adoption of encryption in organizations are increasing at a rapid pace as are the urgency in the encryption implementation plans. The increasing rate of adoption is due to fast evolving regulations and necessity to protect sensitive data across enterprise networks, multiple devices and especially the increasing move to storing data on a cloud.

If you think that there is only one type of encryption – think again!

Encryption considerations differ for technologies namely – database encryption, VoIP encryption, portable storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption, network link encryption, web server encryption, tape backup encryption and many more.

About E|CES

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Functions, DES, and AES. ECES provides necessary skills to perform effective deployment of encryption technologies. It is a comprehensive course covering various algorithms, the key concepts behind those algorithms, applications of the cryptography in various ways and performing cryptanalysis

Other topics introduced

  • Overview of other algorithms such as Blowfish, Twofish, and Skipjack
  • Hashing algorithms including MD5, MD6, SHA, GOST, RIPMD 256 and others
  • Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA
  • Significant concepts such as diffusion, confusion, and Kerkchoff’s principle

Participants will also be provided a practical application of the following:

  • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA
  • How to set up a VPN and encrypt a drive
  • Hands-on experience with steganography

Who is it for?

Prerequisites

No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.

Target Audience

  • Penetration Testers and Computer Forensics Specialists
  • Cloud Security architects, designers, and developers
  • Anyone involved in selecting and implementing VPNs or digital certificates, Information Security Operations
  • Anyone involved in developing Operating Systems, Cryptography Systems, Blockchain based solutions, etc.
  • EXAM TITLE:EC-Council Certified Encryption Specialist
  • Exam Code: 212-81
  • Number of Questions: 50
  • Exam Availability: EC-Council Exam Portal
  • Test Duration: 2 hours
  • Test Format: Multiple Choice
  • Passing Score: 70%

Show More

What Will You Learn?

  • Types of encryption standards and their differences
  • How to select the best standard for your organization?
  • How to enhance your pen-testing knowledge in encryption?
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies

Course Content

Module 01: Introduction and History of Cryptography

  • What is Cryptography?
  • History of Cryptography
  • Mono-Alphabet Substitution (Caesar Cipher, Atbash Cipher, Affine Cipher, ROT13 Cipher)
  • Multi-Alphabet Substitution (Cipher Disk, Vigenère Cipher, Playfair Cipher, ADFGVX Cipher)
  • Homophonic Substitution
  • Null and Book Ciphers
  • Rail Fence Ciphers
  • The Enigma Machine
  • CrypTool

Module 02: Symmetric Cryptography and Hashes

Module 03: Number Theory and Asymmetric Cryptography

Module 04: Applications of Cryptography

Module 05: Cryptanalysis

Student Ratings & Reviews

5.0
Total 3 Ratings
5
3 Ratings
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
10 months ago
Informative, engaging, practical. The course delivers essential insights for those aiming to enhance their online marketing capabilities.
10 months ago
Engaging, practical, essential. The course equips learners to excel in online marketing strategies effectively and efficiently
10 months ago
Dynamic, practical, transformative. The course empowers learners to master effective online marketing strategies with confidence and clarity.