EC-Council Certified Encryption Specialist (E|CES)

canvas eccouncil2canvas2014 2canvas Encryption Specialistcanvas Specialistcanvas ECES

eces-banner
Computek is one of the largest and first Ec-council learning solution in egypt with 20 years of experience delivering training and certifications in all technologies.All Ec-Council Training in computek is held by Ec-Council Certified Instructors with over than 10 years experience in the technical and training field .
ceh-Course-Description

eces-img

 

 

The EC-Council Certified Encryption Specialist (E|CES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

 

Overview of other algorithms such as Blowfish, Twofish, and Skipjack

 

Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.

 

Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.

 

Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.



Practical-application

Participants will also be provided a practical application of the following:

How to set up a VPN

Encrypt a drive

Hands-on experience with steganography

Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.


ceh-Who-Should-Attendeces-who-attend

Anyone involved in selecting, implementing VPN’s or digital certificates should attend this course first.  Without understanding the cryptography at some depth, people are limited to following marketing hype.  Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely.  Many penetration testing professionals testing usually don’t attempt to crack cryptography.  A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

eces-exam-infoExam info

Number of Questions: 50

Passing Score: 70%

Test Duration: 2 Hours

Test Format: Multiple Choice

Test Delivery: EC-Council Exam Center (ECC EXAM)

Course/Class Duration: 3 days / 20 hours

 

eces-courseoutline

canvas ECEScourse222outline333

Introduction and History of Cryptography

What is Cryptography?

History

Mono-Alphabet Substitution

Caesar Cipher

Atbash Cipher

ROT 13

Scytale

Single Substitution Weaknesses

Multi-Alphabet Substitution

Cipher Disk

Vigenère Cipher

Vigenère Cipher: Example

Breaking the Vigenère Cipher

Playfair

The ADFGVX cipher

The Enigma Machine

CrypTool

Symmetric Cryptography & Hashes

Symmetric Cryptography

Information Theory

Information Theory Cryptography Concepts

Kerckhoffs's Principle

Substitution

Transposition

Substitution and Transposition

Binary M

ath

Binary AND

Binary OR

Binary XOR

Block Cipher vs. Stream Cipher

Symmetric Block Cipher Algorithms

Basic Facts of the Feistel Function

The Feistel Function

A Simple View of a Single Round

Unbalanced Feistel Cipher

DES

3DES

DESx

Whitening

AES

AES General Overview

AES Specifics

Blowfish

Serpent

Twofish

Skipjack

IDEA

Symmetric Algorithm Methods

Electronic Codebook (ECB)

Cipher-Block Chaining (CBC)

Propagating Cipher-Block Chaining (PCBC)

Cipher Feedback (CFB)

Output Feedback (OFB)

Counter (CTR)

Initialization Vector (IV)

Symmetric Stream Ciphers

Example of Symmetric Stream Ciphers: RC4

Example of Symmetric Stream Ciphers: FISH

Example of Symmetric Stream Ciphers: PIKE

Hash

Hash – Salt

MD5

The MD5 Algorithm

MD6

Secure Hash Algorithm (SHA)

Fork 256

RIPEMD – 160

GOST

Tiger

CryptoBench

Number Theory and Asymmetric Cryptography

Asymmetric Encryption

Basic Number Facts

Prime Numbers

Co-Prime

Eulers Totient

Modulus Operator

Fibonacci Numbers

Birthday Problem

Birthday Theorem

Birthday Attack

Random Number Generators

Classification of Random Number Generators

Naor-Reingold and Mersenne Twister Pseudorandom Function

Linear Congruential Generator

Lehmer Random Number Generator

Lagged Fibonacci Generator

Diffie-Hellman

Rivest Shamir Adleman (RSA)

RSA – How it Works

RSA Example

Menezes–Qu–Vanstone

Digital Signature Algorithm

Signing with DSA

Elliptic Curve

Elliptic Curve Variations

Elgamal

CrypTool

Applications of Cryptography 1

Digital Signatures

What is a Digital Certificate?

Digital Certificates

X.509

X.509 Certificates

X.509 Certificate Content

X.509 Certificate File Extensions

Certificate Authority (CA)

Registration Authority (RA)

Public Key Infrastructure (PKI)

Digital Certificate Terminology

Server-based Certificate Validation Protocol

Digital Certificate Management

Trust Models

Certificates and Web Servers

Microsoft Certificate Services

Windows Certificates: certmgr.msc

Authentication

Password Authentication Protocol (PAP)

Shiva Password Authentication Protocol (S-PAP)

Challenge-Handshake Authentication Protocol (CHAP)

Kerberos

Components of Kerberos System

Pretty Good Privacy (PGP)

PGP Certificates

Wifi Encryption

Wired Equivalent Privacy (WEP)

WPA - Wi-Fi Protected Access

WPA2

SSL

TLS

Virtual Private Network (VPN)

Point-to-Point Tunneling Protocol (PPTP)

PPTP VPN

Layer 2 Tunneling Protocol VPN

Internet Protocol Security VPN

SSL/VPN

Encrypting Files

Backing up the EFS key

Restoring the EFS Key

Bitlocker

Bitlocker: Screenshot

Disk Encryption Software: Truecrypt

Steganography

Steganography Terms

Historical Steganography

Steganography Details

Other Forms of Steganography

Steganography Implementations

Demonstration

Steganalysis

Steganalysis – Raw Quick Pair

Steganalysis - Chi-Square Analysis

Steganalysis - Audio Steganalysis

Steganography Detection Tools

National Security Agency and Cryptography

NSA Suite A Encryption Algorithms

NSA Suite B Encryption Algorithms

National Security Agency: Type 1 Algorithms

National Security Agency: Type 2 Algorithms

National Security Agency: Type 3 Algorithms

National Security Agency: Type 4 Algorithms

Unbreakable Encryption

Applications of Cryptography 2

Breaking Ciphers

Cryptanalysis

Frequency Analysis

Kasiski

Cracking Modern Cryptography

Cracking Modern Cryptography: Chosen Plaintext Attack

Linear Cryptanalysis

Differential Cryptanalysis

Integral Cryptanalysis

Cryptanalysis Resources

Cryptanalysis Success

Rainbow Tables

Password Cracking

Tools


become an ethical hackerbecoma a forensic Investigator
become a secure computer userbecome an Enryption Specialist
become a network security administratorBecome a Network Defense Architect

  •                         ec-council-logo-reflection
need best quotation for a training course in egypt call

sat-guaranteed

We are committed to providing our customers with the best service and products available.

100% satisfaction guarantee

why students prefer computek as the best training center in egypt new

1.Computek Training Center has trained over 1,000,000 trainees in Egypt and over 100,000 trainees in Middle East and africa.

2.Our programs are designed to meet our clients' training necessities including budget and time limitation.

3.We will cooperate with you to bring out effective programs fitting your organization.

4.Computek Training Center provides customer-focus training in mutable deliverymethods offering top quality training and high qualified instructor to meet individual learning styles and organization profession training.

5.Computek instructors are selected from the best of training professional instructors in Egypt who awarded the trust worthy certified international companies, Computek instructors not only provide superior education but also reliable work experience in the field of giving courses

6.Trainees prefer Computek Training Center not only due to our high quality training but also for our reasonable and cost-effective price list.

7.Computek Classroom is designed with cutting edge facilities strong from hardware and software technologies to the most sophisticated educational aids.

8.The information desk with our friendly and professional customers support representative is highly qualified to answer any questions and also deliver your unique requirements.

9.Computek Training Center staff is available 7 days in week from 10:00 AM to 10:00 PM to deal with any inquiries and assist student with anything they need.

10.Computek Training Center is partner of world's technology leads such as Microsoft, Cisco, Compatia, EC Council ,Adobe , Autodesk, prometric and Pearson VUE.

All Rights Reseved © Computekeg.com