EC-Council Certified Encryption Specialist v2

EC-Council

EC-Council Certified Encryption Specialist v2

ECES Course Overview

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

  • Overview of other algorithms such as Blowfish, Twofish, and Skipjack
  • Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
  • Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
  • Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.
Why take ECES?

What you will learn:

  • Types of Encryption Standards and their differences
  • How to select the best standard for your organization
  • How to enhance your pen-testing knowledge in encryption
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies
Who is it for?

Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

Overview Course Outline About the exam

Learning Objectives for ECES v2 Training Course

Participants will also be provided a practical application of the following:

  • How to set up a VPN
  • Encrypt a drive
  • Hands-on experience with steganography
  • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.

This course covers:

1. Introduction and History of Cryptography

  • What is Cryptography?
  • History
  • Mono-Alphabet Substitution
  • Multi-Alphabet Substitution
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • The Enigma Machine
  • CrypTool

2. Symmetric Cryptography & Hashes

  • Symmetric Cryptography
  • Information Theory
  • Kerckhoffs's Principle
  • Substitution
  • Transposition
  • Substitution and Transposition
  • Binary Math
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
  • Symmetric Algorithm Methods
  • Symmetric Stream Ciphers
  • Hash Function
  • CryptoBench

3 Number Theory and Asymmetric Cryptography

  • Asymmetric Encryption
  • Basic Number Facts
  • Birthday Theorem
  • Random Number Generators
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
  • Elliptic Curve
  • Elgamal
  • CrypTool

4 Applications of Cryptography

  • Digital Signatures
  • What is a Digital Certificate?
  • Certificate Authority (CA)
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
  • Pretty Good Privacy (PGP)
  • Wifi Encryption
  • SSL
  • TLS
  • Virtual Private Network (VPN)
  • Encrypting Files
  • Bitlocker
  • Disk Encryption Software: VeraCrypt
  • Steganography
  • Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
  • Unbreakable Encryption

5. Cryptanalysis

  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools
Exam Codes212-812 (ECC EXAM)
Number of Questions50 questions per exam
Type of QuestionsMultiple choice
Length of Test2 Hours / 120 Minutes
Testing ProviderECC EXAM PORTAL
Passing Score70%

Course Highlights

EC-Council Authorized Partner
96% passing rate
Get certified at an affordable price
Blended learning delivery model
CEI Certified Trainers

Contact

  • Unit 15B Penthouse Atherton Place, Tomas Morato, Corner Don A. Roces Ave, Quezon City, 1103 Metro Manila
  • +(632) 7905 8718
  • sales@teched.com.ph

Brochures

View our Course Documents below with the current Curriculum and Pricing presented in an easy to read guide for the course offered.

Testimonials

Training at TechED has been amazing. The instructor has provided us with so much in depth knowledge regarding the course including course material which are detailed and a lot of iLabs for hands on experience. Would recommend for anyone looking to study.

Francis C.

Network Security Administrator, Manufacturing Sector

The instructor is exceptionally knowledgeable and provided valuable additional content and labs.

Erick Z.

Cybersecurity Director, BPO Industry

Considering the difficult times we live in with COVID-19, the online training delivery as well as the staff were superb.

The course really keyed in all the topics of the exam. The material slides, documentation, labs was well written and presented. The instructor really knew his stuff and you could tell he was passionate about the subject. 

Christian L.

IT Manager, Health Sector

TechED's training was excellent. The trainer was able to explain all the material and extra on top of that which I think will help me with future training and in my work environment. I would highly recommend it to anyone wishing to further their knowledge in a quick and easy way.

Mike S.

US Military

The Cybersecurity Trainings and Instructor provided by TechED are a must for anyone working in the field. It provides a wealth of useful information that might be useful when you get back to work.

Richard J.

Cybersecurity Specialist, US DOD Contractor

At vero eos et accusamus et iusto odio digni goikussimos ducimus qui to bonfo blanditiis praese. Ntium voluum deleniti atque.

Melbourne, Australia
(Sat - Thursday)
(10am - 05 pm)

No products in the cart.

Subscribe to our newsletter

Sign up to receive latest news, updates, promotions, and special offers delivered directly to your inbox.
No, thanks
X