Narrated ‘Ali bin Abi Talib (RA): The Prophet (RA) stood up for a funeral (to show respect) and thereafter he sat down. (Dawud)

Certified Encryption Specialist (ECES)

4.5/5

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

  • Overview of other algorithms such as Blowfish, Twofish, and Skipjack
  • Hashing algorithms include MD5, MD6, SHA, Gost, RIPMD 256 and others.
  • Asymmetric cryptography includes thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
  • Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.
EC-Council-removebg-preview

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Corporate Training Options

Online Instructor Led

2

Classroom Training

undraw_building_re_xfcm 1

Onsite Training

Overseas Training

Course Information

Module 1: Introduction and History of Cryptography

  • What is Cryptography?
  • History
  • Mono-Alphabet Substitution
  • Caesar Cipher
  • Atbash Cipher
  • ROT 13
  • Scytale
  • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
  • Cipher Disk
  • Vigenère Cipher
  • Vigenère Cipher: Example
  • Breaking the Vigenère Cipher
  • Playfair
  • The ADFGVX cipher
  • The Enigma Machine
  • CrypTool

Module 2: Symmetric Cryptography and Hashes

  • Symmetric Cryptography
  • Information Theory
  • Information Theory Cryptography Concepts
  • Kerckhoffs's Principle
  • Substitution
  • Transposition
  • Substitution and Transposition
  • Binary M
  • ath
  • Binary AND
  • Binary OR
  • Binary XOR
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
  • Basic Facts of the Feistel Function
  • The Feistel Function
  • A Simple View of a Single Round
  • Unbalanced Feistel Cipher
  • DES
  • 3DES
  • DESx
  • Whitening
  • AES
  • AES General Overview
  • AES Specifics
  • Blowfish
  • Serpent
  • Twofish
  • Skipjack
  • IDEA
  • Symmetric Algorithm Methods
  • Electronic Codebook (ECB)
  • Cipher-Block Chaining (CBC)
  • Propagating Cipher-Block Chaining (PCBC)
  • Cipher Feedback (CFB)
  • Output Feedback (OFB)
  • Counter (CTR)
  • Initialization Vector (IV)
  • Symmetric Stream Ciphers
  • Example of Symmetric Stream Ciphers: RC4
  • Example of Symmetric Stream Ciphers: FISH
  • Example of Symmetric Stream Ciphers: PIKE
  • Hash
  • Hash – Salt
  • MD5
  • The MD5 Algorithm
  • MD6
  • Secure Hash Algorithm (SHA)
  • Fork 256
  • RIPEMD – 160
  • GOST
  • Tiger
  • CryptoBench

» Show More 👇

Module 3: Number theory and Asymmetric Cryptography

  • Asymmetric Encryption
  • Basic Number Facts
  • Prime Numbers
  • Co-Prime
  • Eulers Totient
  • Modulus Operator
  • Fibonacci Numbers
  • Birthday Problem
  • Birthday Theorem
  • Birthday Attack
  • Random Number Generators
  • Classification of Random Number Generators
  • Naor-Reingold and Mersenne Twister Pseudorandom Function
  • Linear Congruential Generator
  • Lehmer Random Number Generator
  • Lagged Fibonacci Generator
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
  • RSA – How it Works
  • RSA Example
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
  • Signing with DSA
  • Elliptic Curve
  • Elliptic Curve Variations
  • Elgamal
  • CrypTool

Module 4: Applications of Cryptography part 1

  • Digital Signatures
  • What is a Digital Certificate?
  • Digital Certificates
  • X.509
  • X.509 Certificates
  • X.509 Certificate Content
  • X.509 Certificate File Extensions
  • Certificate Authority (CA)
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
  • Password Authentication Protocol (PAP)
  • Shiva Password Authentication Protocol (S-PAP)
  • Challenge-Handshake Authentication Protocol (CHAP)
  • Kerberos
  • Components of Kerberos System
  • Pretty Good Privacy (PGP)
  • PGP Certificates
  • Wifi Encryption
  • Wired Equivalent Privacy (WEP)
  • WPA - Wi-Fi Protected Access
  • WPA2
  • SSL
  • TLS
  • Virtual Private Network (VPN)
  • Point-to-Point Tunneling Protocol (PPTP)
  • PPTP VPN
  • Layer 2 Tunneling Protocol VPN
  • Internet Protocol Security VPN
  • SSL/VPN
  • Encrypting Files
  • Backing up the EFS key
  • Restoring the EFS Key
  • Bitlocker
  • Bitlocker: Screenshot
  • Disk Encryption Software: Truecrypt
  • Steganography
  • Steganography Terms
  • Historical Steganography
  • Steganography Details
  • Other Forms of Steganography
  • Steganography Implementations
  • Demonstration
  • Steganalysis
  • Steganalysis – Raw Quick Pair
  • Steganalysis - Chi-Square Analysis
  • Steganalysis - Audio Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
  • NSA Suite A Encryption Algorithms
  • NSA Suite B Encryption Algorithms
  • National Security Agency: Type 1 Algorithms
  • National Security Agency: Type 2 Algorithms
  • National Security Agency: Type 3 Algorithms
  • National Security Agency: Type 4 Algorithms
  • Unbreakable Encryption

Module 5: Applications of Cryptography part 2

  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
  • Cracking Modern Cryptography: Chosen Plaintext Attack
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools

» Show Less 👆

Audience Profile

Anyone involved in selecting, implementing VPN’s or digital certificates should attend this course first.  Without understanding the cryptography at some depth, people are limited to following marketing hype.  Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely.  Many penetration testing professionals testing usually don’t attempt to crack cryptography.  A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

Corporate Training Options

Online Instructor Led

Live, Online Training by top Instructors and practitioners across the globe.

Onsite
Training

Conduct training at the work location you desired.

Classroom Training

The Venue will be ideally located and easy to access with covid-19 SOP's.

Overseas Training

Travel to any desired location for your training.

Upcoming Batch

Enquiry Form:

Testimonials?

Mohammed Aljbreen Operation Specialist, SAMA

The Clarity of the Content was very good. The explanation of the trainer with in-depth knowledge in a proper flow really impressed me to give 5 star rating.

Arindam Chakraborty Systems Specialist, King Abdullah University of Sciences & Technology

The Instructor was really impressive. Clear cut explanation of every topic he covered with real time scenarios.

Sher Afzal Khan Cloud Engineer, Cloud 9 Networks

The Trainer and the Course Material, both are good. Good flow of explanation with simple examples. The complete training was focused on current industry challenges.

Jawed Ahmad Siddiqui Sr. System Administrator, Saudi Ceramics

The Trainer’s presentation was impressed me to continue the course till end. Never feel bore till the entire sessions. She studied our mindset and follows.

    Not sure,
    which course to choose?

    Our Clients across the Globe!

    Our Corporate Clients

    Best Solution To Transform Your Corporate Environment.

    Our Offices.

    UAE

    Office No- 306, Galadari Mazda Building Airport Road, Garhoud, Dubai.

    SPAIN

    C / Aribau 11 2-4 08913 Badalona Barcelona,
    Spain.

    UK

    85 Skeffington Road East Ham E6 2NA,
    London.

    AUS

    Level 22, HWT Tower, 40 City Road, Southbank, Melbourne VIC 3006.

    IN

    12B, Chitrapuri Hills, Hyderabad, Telangana
    India.