Become a Certified Encryption Specialist E|CES

EC-Council Certified Encryption Specialist E|CES

Course Description

As the size and frequency of data breaches increasing over time, more and more organizations are rapidly recognizing that encryption is no longer an option. They are busy formulating comprehensive strategy and shifting their stance towards encryption technologies and rapidly deploying a range of technologies to defend and protect their sensitive data from internal and external threats. Increasingly, business users are influencing the adoption of encryption technologies more than IT operations teams.

Adoption of encryption in organizations are increasing at a rapid pace as are the urgency in the encryption implementation plans. The increasing rate of adoption is due to fast evolving regulations and necessity to protect sensitive data across enterprise networks, multiple devices and especially the increasing move to storing data on a cloud.

If you think that there is only one type of encryption – think again!

Encryption considerations differ for technologies namely – database encryption, VoIP encryption, portable storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption, network link encryption, web server encryption, tape backup encryption and many more.

About E|CES

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Functions, DES, and AES. ECES provides necessary skills to perform effective deployment of encryption technologies. It is a comprehensive course covering various algorithms, the key concepts behind those algorithms, applications of the cryptography in various ways and performing cryptanalysis

Other topics introduced

Overview of other algorithms such as Blowfish, Twofish, and Skipjack

Hashing algorithms including MD5, MD6, SHA, GOST, RIPMD 256 and others

Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA

Significant concepts such as diffusion, confusion, and Kerkchoff’s principle

Participants will also be provided a practical application of the following:

Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA

How to set up a VPN and encrypt a drive

Hands-on experience with steganography

EC-Council Certified Encryption Specialist
Program Information