EC-Council Certified
Encryption Specialist
(ECES)

Overview

The training helps information security professionals to gain far-reaching understanding of cryptography. The training provides understanding of the core concepts of futuristic key and symmetric cryptography along with a detailed understanding of algorithms including DES, AES and Feistel Networks. Candidates also learn about algorithms such as Twofish, Blowfish, and Skipjack, hashing algorithms such as SHA, MD5, MD6, RIPMD 256, Gost, etc. The program also covers the fundamentals of asymmetric cryptography that consists of ElGamal, RSA, DSA, and Elliptic Curve. Eminent concepts like confusion, diffusion, and Kerkchoff’s principle, setting up a VPN, encrypting a drive, implementing steganography and cryptographic algorithms including ciphers such as Caesar cipher, AES and RSA are also explained during this certification training.

Course Objective

The ECES certification training focuses to impart a deep understanding of:
• Encryption standards, types, and differences
• Selecting appropriate encryption standard for the organization
• Ways to advance pen-testing skills in encryption
• Correcting and incorrecting the deployment of various encryption technologies
• Common possible mistakes while implementing encryption technologies
• Best practices to implement encryption technologies

Who Should Attend

• Ethical hackers
• Penetration testing professionals
• Cryptanalysts

Prerequisites

Work experience of at least one year in the Information Security domain.

Analyzing Data with MS Excel

Training Calendar

Intake

Duration

Program Fees

Inquire further

3 Day

Contact us to find out more

Module


• What is Cryptography?
• History of Cryptography
• Mono-Alphabet Substitution
o Caesar Cipher
o Atbash Cipher
o Affine Cipher
o ROT13 Cipher
o Scytale
o Single Substitution Weaknesses
• Multi-Alphabet Substitution
o Cipher Disk
o Vigenère Cipher
• Null Ciphers
▪ Vigenère Cipher: Example
▪ Breaking the Vigenère Cipher
o Playfair Cipher
o ADFGVX Cipher
• Homophonic Substitution
• Book Ciphers
• Rail Fence Ciphers
• The Enigma Machine
• CrypTool

• Symmetric Cryptography
• Information Theory
  o Information Theory Cryptography Concepts
• Kerckhoff’s Principle
• Substitution
• Transposition
• Binary Math
  o Binary AND, Binary OR, Binary XOR
• Block Cipher vs. Stream Cipher
• Symmetric Block Cipher Algorithms
  o Basic Facts of the Feistel Function
▪ The Feistel Function
▪ Unbalanced Feistel Cipher
  o Data Encryption Standards (DES)
 o 3DES
▪ DESx
▪ Whitening
 o Advanced Encryption Standard (AES)
▪ AES General Overview
▪ AES Specifics
 o Blowfish
 o Serpent
 o Twofish
 o Skipjack
 o International Data Encryption Algorithm (IDEA)
 o CAST
 o Tiny Encryption Algorithm (TEA)
 o SHARK
• Symmetric Algorithm Methods
 o Electronic Codebook (ECB)
 o Cipher-Block Chaining (CBC)
 o Propagating Cipher-Block Chaining (PCBC)
 o Cipher Feedback (CFB)
 o Output Feedback (OFB)
 o Counter (CTR)
 o Initialization Vector (IV)
• Hash Function
 o Hash – Salt
 o MD5
• Symmetric Stream Ciphers
 o Example of Symmetric Stream Ciphers: RC4
 o Example of Symmetric Stream Ciphers: FISH
 o Example of Symmetric Stream Ciphers: PIKE
▪ The MD5 Algorithm
 o MD6
 o Secure Hash Algorithm (SHA)
 o FORK-256
 o RIPEMD-160
 o GOST
 o Tiger
 o MAC and HMAC
• CryptoBench

• Asymmetric Encryption
• Basic Number Facts
o Prime Numbers
o Co-Prime Numbers
o Euler’s Totient
• Birthday Theorem
o Birthday Paradox
▪ Birthday Paradox: Probability
o Birthday Attack
• Random Number Generator
o Classification of Random Number Generator
o Traits of a Good PRNG
o Naor-Reingold and Mersenne Twister Pseudorandom
Function
o Linear Congruential Generator
o Lehmer Random Number Generator
o Lagged Fibonacci Generator (LFG)
o Blum Blum Shub
o Yarrow
o Fortuna
• Diffie-Hellman
• Rivest Shamir Adleman (RSA)
o RSA – How It Works
o RSA Example
• Menezes-Qu-Vanstone
• Digital Signature Algorithm
o Signing with DSA
• Elliptic Curve
• Elliptic Curve Variations
• Elgamal
• CrypTool

• FIPS Standards
• Digital Signatures
• What is a Digital Certificate?
o Digital Certificates
▪ X.509
▪ X.509 Certificates
▪ X.509 Certificate Content
▪ X.509 Certificate File Extensions
• Certificate Authority (CA)
o Certificate Authority – Verisign
• Registration Authority (RA)
• Public Key Infrastructure (PKI)
• Digital Certificate Terminology
• Server-based Certificate Validation Protocol
• Digital Certification Management
• Trust Models
• Certificates and Web Servers
• Microsoft Certificate Services
• Windows Certificate: certmgr.msc
• Pretty Good Privacy (PGP)
o PGP Certificates
• SSL
• TLS
• Authentication
o Password Authentication Protocol (PAP)
o Shiva Password Authentication Protocol (S-PAP)
o Challenge-Handshake Authentication Protocol (CHAP)
o Kerberos
▪ Components of Kerberos System
▪ Kerberos Authentication Process
• Wi-Fi Encryption
o Wired Equivalent Privacy (WEP)
o WPA – Wi-Fi Protected Access
o WPA2
• Virtual Private Network (VPN)
o Point-to-Point Tunneling Protocol (PPTP)
▪ PPTP VPN
o Layer 2 Tunneling Protocol VPN
o Internet Protocol Security VPN
o SSL/TLS VPN
• Encrypting Files
o Backing up the EFS key
o Restoring the EFS key
• BitLocker
• BitLocker: Screenshot
• Disk Encryption Software: VeraCrypt
• Common Cryptography Mistakes
• Steganography
o Steganography Terms
o Historical Steganography
o Steganography Details
o Other Forms of Steganography
o How to Embed?
o Steganography File Systems
o Steganography Implementations
o Demonstration
• Steganalysis
o Steganalysis – Raw Quick Pair
o Steganalysis – Chi-Square Analysis
o Steganalysis – Audio Steganalysis
• Steganography Detection Tools
• National Security Agency and Cryptography
o NSA Suite A Encryption Algorithms
o NSA Suite B Encryption Algorithms
o National Security Agency: Type 1 Algorithms
o National Security Agency: Type 2 Algorithms
o National Security Agency: Type 3 Algorithms
o National Security Agency: Type 4 Algorithms
• Unbreakable Encryption

• Breaking Ciphers
• Cryptanalysis
• Frequency Analysis
• Kasiski
• Cracking Modern Cryptography
o Cracking Modern Cryptography: Chosen Plaintext Attack
o Cracking Modern Cryptography: Ciphertext-only and
Related-key Attack
• Linear Cryptoanalysis
• Differential Cryptoanalysis
• Integral Cryptoanalysis
• Cryptoanalysis Resources
• Cryptoanalysis Success
• Rainbow Tables
• Password Cracking
• Tools

FAQs

Q: What is the EC-Council Certified Encryption Specialist (ECES) course about?
A: The ECES course provides a comprehensive understanding of modern cryptography. It covers symmetric and asymmetric encryption, hashing algorithms, encryption standards, and practical implementations like VPNs, disk encryption, and steganography. Participants also gain insight into cryptographic algorithms such as AES, DES, RSA, Blowfish, Twofish, and various cryptanalysis techniques.

Q: Who should attend this course?
A: The ECES course is designed for ethical hackers, penetration testing professionals, cryptanalysts, and information security professionals interested in strengthening their cryptography knowledge.

Q: What are the prerequisites for this course?
A: Participants should have at least one year of work experience in the Information Security domain to fully benefit from the training.

Q: How long is the course?
A: The course duration is 3 days.

Q: What key topics are covered in this course?
A: Key topics include history and fundamentals of cryptography, symmetric encryption algorithms like AES, DES, and Twofish, hashing algorithms such as SHA, MD5, and RIPEMD, asymmetric cryptography including RSA, DSA, and Elliptic Curve, cryptographic applications like VPNs, digital certificates, and BitLocker, steganography and steganalysis, and cryptanalysis methods including frequency analysis and differential cryptoanalysis.

Q: Will I receive a certification after completing the course?
A: Yes. Upon successful completion of the course and exam, you will earn the EC-Council Certified Encryption Specialist (ECES) certification, demonstrating your expertise in cryptographic technologies and practices.

Q: What is the EC-Council Certified Encryption Specialist (ECES) course about?
A: The ECES course builds specialized knowledge in cryptography, covering both symmetric and asymmetric encryption, hashing, steganography, and cryptanalysis. It provides a deep dive into encryption standards, cryptographic algorithms, and practical implementation techniques including VPN setup, drive encryption, and detecting common cryptographic mistakes.

Q: Who should attend this course?
A: This course is ideal for ethical hackers, penetration testers, cryptanalysts, and information security professionals seeking to enhance their understanding of encryption technologies and cryptographic principles.

Q: What are the prerequisites for this course?
A: Participants should have at least one year of experience in the Information Security domain with foundational knowledge in security practices.

Q: How long is the course?
A: The course duration is 3 days.

Q: What key topics are covered in this course?
A: Topics include history of cryptography, symmetric and asymmetric encryption algorithms (AES, DES, RSA, ECC), hashing methods (MD5, SHA, RIPEMD), digital signatures and certificates, VPNs, BitLocker, steganography techniques, and cryptanalysis methods such as frequency analysis and chosen plaintext attacks.

Q: Will I learn about real-world encryption practices?
A: Yes, the course includes practical applications such as file encryption, certificate management, VPN configuration, and using tools like CrypTool and VeraCrypt to demonstrate real-world scenarios.

Q: Will I receive a certification after completing the course?
A: Yes. After completing the training and passing the exam, participants will earn the EC-Council Certified Encryption Specialist (ECES) certification.

Submit your interest today !