Join our scheduled public courses to expand your knowledge, connect with industry peers, and grow your professional network. • Scheduled regularly at convenient locations. • Open to professionals from various organizations. • Comprehensive curriculum covering key industry topics. • Networking opportunities with peers from different sectors.
Benefit from tailored training programs delivered at your location, addressing your specific organizational needs and goals. • Customized training programs tailored to your organization’s needs. • Conducted at your location for convenience and relevance. • Focused on specific challenges and objectives of your team. • Hands-on, practical sessions to enhance learning and application.
Experience interactive online training sessions that offer flexibility and real-time engagement, accessible from anywhere in the world. • Interactive online sessions with expert instructors. • Flexible scheduling to accommodate different time zones. • Real-time engagement and Q&A for immediate feedback. • Access to digital resources and recorded sessions for future reference.
Course Overview
The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:
Overview of other algorithms such as Blowfish, Twofish, and Skipjack
Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.
Participants will also be provided a practical application of the following:
How to set up a VPN
Encrypt a drive
Hands-on experience with steganography
Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Duration
3 Days (24 Hours)
Target Audience
Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.
This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. A basic knowledge of cryptanalysis is very beneficial to any penetration testing.
Learning Objectives
What is Cryptography?
History
Mono-Alphabet Substitution
Caesar Cipher
Atbash Cipher
ROT 13
Scytale
Single Substitution Weaknesses
Multi-Alphabet Substitution
Cipher Disk
Vigenère Cipher
Vigenère Cipher: Example
Breaking the Vigenère Cipher
Playfair
The ADFGVX cipher
The Enigma Machine
CrypTool
Course Content
Module 1: Introduction and History of Cryptography
Lesson 1: What is Cryptography?
Lesson 2: History
Lesson 3: Mono-Alphabet Substitution
Lesson 4: Caesar Cipher
Lesson 5: Atbash Cipher
Lesson 6: ROT 13
Lesson 7: Scytale
Lesson 8: Single Substitution Weaknesses
Lesson 9: Multi-Alphabet Substitution
Lesson 10: Cipher Disk
Lesson 11: Vigenère Cipher
Lesson 12: Vigenère Cipher: Example
Lesson 13: Breaking the Vigenère Cipher
Lesson 14: Playfair
Lesson 15: The ADFGVX cipher
Lesson 16: The Enigma Machine
Lesson 17: CrypTool
Module 2: Symmetric Cryptography & Hashes
Lesson 1: Symmetric Cryptography
Lesson 2: Information Theory
Lesson 3: Information Theory Cryptography Concepts
Lesson 4: Kerckhoffs's Principle
Lesson 5: Substitution
Lesson 6: Transposition
Lesson 7: Substitution and Transposition
Lesson 8: Binary Math
Lesson 9: Binary AND
Lesson 10: Binary OR
Lesson 11: Binary XOR
Lesson 12: Block Cipher vs. Stream Cipher
Lesson 13: Symmetric Block Cipher Algorithms
Lesson 14: Basic Facts of the Feistel Function
Lesson 15: The Feistel Function
Lesson 16: A Simple View of a Single Round
Lesson 17: Unbalanced Feistel Cipher
Lesson 18: DES
Lesson 19: 3DES
Lesson 20: DESx
Lesson 21: Whitening
Lesson 22: AES
Lesson 23: AES General Overview
Lesson 24: AES Specifics
Lesson 25: Serpent
Lesson 26: Twofish
Lesson 27: Skipjack
Lesson 28: IDEA
Lesson 29: Symmetric Algorithm Methods
Lesson 30: Electronic Codebook (ECB)
Lesson 31: Cipher-Block Chaining (CBC)
Lesson 32: Propagating Cipher-Block Chaining (PCBC)
Lesson 33: Cipher Feedback (CFB)
Lesson 34: Output Feedback (OFB)
Lesson 35: Counter (CTR)
Lesson 36: Initialisation Vector (IV)
Lesson 37: Symmetric Stream Ciphers
Lesson 38: Example of Symmetric Stream Ciphers: RC4
Lesson 39: Example of Symmetric Stream Ciphers: FISH
Lesson 40: Example of Symmetric Stream Ciphers: PIKE
Lesson 41: Hash
Lesson 42: Hash – Salt
Lesson 43: MD5
Lesson 44: The MD5 Algorithm
Lesson 45: MD6
Lesson 46: Secure Hash Algorithm (SHA)
Lesson 47: Fork 256
Lesson 48: RIPEMD – 160
Lesson 49: GOST
Lesson 50: Tiger
Lesson 51: CryptoBench
Module 3: Number Theory and Asymmetric Cryptography
Lesson 1: Asymmetric Encryption
Lesson 2: Basic Number Facts
Lesson 3: Prime Numbers
Lesson 4: Co-Prime
Lesson 5: Eulers Totient
Lesson 6: Modulus Operator
Lesson 7: Fibonacci Numbers
Lesson 8: Birthday Problem
Lesson 9: Birthday Theorem
Lesson 10: Birthday Attack
Lesson 11: Random Number Generators
Lesson 12: Classification of Random Number Generators
Lesson 13: Naor-Reingold and Mersenne Twister Pseudorandom Function
Lesson 14: Linear Congruential Generator
Lesson 15: Lehmer Random Number Generator
Lesson 16: Lagged Fibonacci Generator
Lesson 17: Diffie-Hellman
Lesson 18: Rivest Shamir Adleman (RSA)
Lesson 19: RSA – How it Works
Lesson 20: RSA Example
Lesson 21: Menezes–Qu–Vanstone
Lesson 22: Digital Signature Algorithm
Lesson 23: Signing with DSA
Lesson 24: Elliptic Curve
Lesson 25: Elliptic Curve Variations
Lesson 26: Elgamal
Lesson 27: CrypTool
Module 4: Applications of Cryptography
Lesson 1: Digital Signatures
Lesson 2: What is a Digital Certificate?
Lesson 3: Digital Certificates
Lesson 4: X.509
Lesson 5: X.509 Certificates
Lesson 6: X.509 Certificate Content
Lesson 7: X.509 Certificate File Extensions
Lesson 8: Certificate Authority (CA)
Lesson 9: Registration Authority (RA)
Lesson 10: Public Key Infrastructure (PKI)
Lesson 11: Digital Certificate Terminology
Lesson 12: Server-based Certificate Validation Protocol
Lesson 13: Digital Certificate Management
Lesson 14: Trust Models
Lesson 15: Certificates and Web Servers
Lesson 16: Microsoft Certificate Services
Lesson 17: Windows Certificates: certmgr.msc
Lesson 18: Authentication
Lesson 19: Password Authentication Protocol (PAP)
Lesson 20: Shiva Password Authentication Protocol (S-PAP)
Lesson 21: Challenge-Handshake Authentication Protocol (CHAP)
Lesson 22: Kerberos
Lesson 23: Components of Kerberos System
Lesson 24: Pretty Good Privacy (PGP)
Lesson 25: PGP Certificates
Lesson 26: Wifi Encryption
Lesson 27: Wired Equivalent Privacy (WEP)
Lesson 28: WPA - Wi-Fi Protected Access
Lesson 29: WPA2
Lesson 30: SSL
Lesson 31: TLS
Lesson 32: Virtual Private Network (VPN)
Lesson 33: Point-to-Point Tunneling Protocol (PPTP)
Lesson 34: PPTP VPN
Lesson 35: Layer 2 Tunneling Protocol VPN
Lesson 36: Internet Protocol Security VPN
Lesson 37: SSL/VPN
Lesson 38: Encrypting Files
Lesson 39: Backing up the EFS key
Lesson 40: Restoring the EFS Key
Lesson 41: Bitlocker
Lesson 42: Bitlocker: Screenshot
Lesson 43: Disk Encryption Software: Truecrypt
Lesson 44: Steganography
Lesson 45: Steganography Terms
Lesson 46: Historical Steganography
Lesson 47: Steganography Details
Lesson 48: Other Forms of Steganography
Lesson 49: Steganography Implementations
Lesson 50: Demonstration
Lesson 51: Steganalysis
Lesson 52: Steganalysis – Raw Quick Pair
Lesson 53: Steganalysis - Chi-Square Analysis
Lesson 54: Steganalysis - Audio Steganalysis
Lesson 55: Steganography Detection Tools
Lesson 56: National Security Agency and Cryptography
Lesson 57: NSA Suite A Encryption Algorithms
Lesson 58: NSA Suite B Encryption Algorithms
Lesson 59: National Security Agency: Type 1 Algorithms
Lesson 60: National Security Agency: Type 2 Algorithms
Lesson 61: National Security Agency: Type 3 Algorithms
Lesson 62: National Security Agency: Type 4 Algorithms
Lesson 63: Unbreakable Encryption
Module 5: Applications of Cryptography
Lesson 1: Breaking Ciphers
Lesson 2: Cryptanalysis
Lesson 3: Frequency Analysis
Lesson 4: Kasiski
Lesson 5: Cracking Modern Cryptography
Lesson 6: Cracking Modern Cryptography: Chosen Plaintext Attack
Lesson 7: Linear Cryptanalysis
Lesson 8: Differential Cryptanalysis
Lesson 9: Integral Cryptanalysis
Lesson 10: Cryptanalysis Resources
Lesson 11: Cryptanalysis Success
Lesson 12: Rainbow Tables
Lesson 13: Password Cracking
Lesson 14: Tools
Prerequisites
Attendees should meet the following prerequisites:
Participants who wish to take part in the ECES certification training should have a minimum of 1-year experience in the information security domain along with basic knowledge of cryptanalysis.
If a participant is looking to clear their ECES certification exam, they should attend an instructor-led ECES training from an EC-Council Accredited Training Center
Course Agenda
Day 1
Day 2
Day 3
Technical Requirement
Laptop with minimum 8GB Ram
Connected Monitor for iLabs.
Hi speed Internet Connection as All the labs it will be accessed through EC-Council Cloud
Exam Voucher Validity
It will be valid for 12month starting from the last day of the course.
Certification Expiry
It will be valid for 3 years.