Leader in the cybersecurity training sector.

EC-Council Certified Encryption Specialist (E|CES)

Catégorie
Satisfaction rate
4.9
Success rate
4.9

Description

EC-Council Certified Encryption Specialist (E|CES) program is designed to introduce professionals and students to the intricate field of cryptography. Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more. The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff's principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

Completing the E|CES program empowers individuals to make informed decisions in selecting suitable encryption standards for their organizations. Candidates learn the theoretical aspects of cryptography and possess the practical skills necessary for effective technology deployment. This includes the ability to implement encryption techniques, secure data with VPNs, and navigate the complexities of emerging technologies like quantum computing, making them valuable assets in cybersecurity.

Target group

  • Penetration Testers and Computer Forensics Specialists
  • Cloud security architects, designers, and developers
  • Anyone involved in selecting and implementing VPNs or digital certificates, or information security operations.
  • Anyone involved in developing operating systems, cryptography systems, blockchain-based solutions, etc.

Training Program

Module 01: Introduction and History of Cryptography
  • Gaps in Crypto Knowledge
  • What is Cryptography?
  • History of Cryptography
  • Mono-Alphabet Substitution
  • Multi-Alphabet Substitution
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • Vernam Cipher
  • The Enigma Machine
  • CrypTool
  • Symmetric Cryptography
  • Information Theory
  • Kerckhoffs's Principle
  • Substitution
  • Transposition
  • Binary Math
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
  • Symmetric Algorithm Methods
  • Symmetric Stream Ciphers
  • Hash Function
  • CryptoBench
  • Asymmetric Encryption
  • Basic Number Facts
  • Birthday Theorem
  • Random Number Generator
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
  • Menezes-Qu-Vanstone
  • MQV
  • Digital Signature Algorithm
  • Elliptic Curve
  • Elgamal
  • Cramer - Shoup
  • YAK
  • Forward Secrecy
  • CrypTool
  • FIPS Standards
  • Digital Signatures
  • What is a Digital Certificate?
  •  Certificate Authority (CA)
  • Registration Authority (RA)
  • Certificate Authority - Verisign
  • Certificate Types
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
  • PGP Certificates
  • Wi-Fi Encryption
  • SSL
  • TLS
  • Diagram
  • Protocols
  • Common SSL/TLS Libraries
  • Virtual Private Network (VPN)
  • Split Tunneling
  • VPN Modes
  • Encrypting Files
  • BitLocker
  • Common Cryptography: Mistakes
  • Steganography
  • Steganalysis
  • Steganography Detection Tools
  • National Security Agency and
    Cryptography
  • Unbreakable Encryption
  • Blockchain
  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools
  • Quantum Computing and Cryptography
  • Timeline
  • Issues for QC
  • Two Branches
  • NIST
  • Major Approaches
  • Lattice-Based Crypto
  • Learning with Errors
  • GGH
  • NTRU
  • Overview
  • Module Overview

Goal

  • Types of Encryption Standards and their differences
  • How to select the best standard for your organisation
  • How to enhance your pen-testing knowledge in encryption
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies
  • Quantum computing and cryptography

Recommended

  • No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required
Book Now

Important information:

Our courses are not registered with the Répertoire National des Certifications Professionnelles (RNCP), but they do comply with the requirements of the Répertoire Spécifique (RS).

Réserver l’événement

icône Form/calendar icon
icône Form/ticket icon
icône Form/up small icon icône Form/down small icon
Billets disponibles: Illimité
Le billet de "" est épuisé. Vous pouvez essayer un autre billet ou une autre date.

We use cookies to improve your experience. See our Cookie policy and our Privacy policy.

Information request

I would like more information about your training courses

ACG Cyberacademy collects and uses the data provided via this form in order to process your registration requests. Fields marked with an * are required. The other information enables us to optimise the follow-up of your request and the quality of our customer relations.