Certified Encryption Specialist (ECES)

Course Overview

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals & students to the domain of cryptography. The participants will learn the footings of modern symmetric & critical cryptography, including the attributes of algorithms such as Feistel Networks, DES, & AES. Other topics introduced-

Synopsis of other algorithms such as Blowfish, Twofish, & Skipjack

Hashing algorithms including MD5, RIPMD 256, MD6, SHA, Gost, & others.

Asymmetric cryptography includes thorough descriptions of RSA, Elgamal, Elliptic Curve, & DSA. 

Significant concepts such as diffusion, confusion, & Kerkchoff's principle.

Prerequisites

Basic IT Security knowledge

Audience Profile

Anyone involved in the selection & implementation of VPNs or digital certificates should attend this course. People need to understand cryptography in some depth to be able to follow marketing hype. Comprehending the actual cryptography allows you to know which one to select. A person completing this course can choose the encryption standard most beneficial to their organization & understand how to deploy that technology effectively. This course is excellent for ethical hackers & penetration testing experts, as most penetration testing courses miss cryptanalysis altogether. Many penetration testing experts testing usually don't endeavor to crack cryptography. Fundamental knowledge of cryptanalysis is very advantageous to any penetration testing.

Content Outline

  • What is Cryptography?
  • History of Cryptography
  • Mono-Alphabet Substitution
  • Caesar Cipher
  • Atbash Cipher
  • Affine Cipher
  • ROT13 Cipher
  • Scytale
  • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
  • Cipher Disk
  • Vigenère Cipher
  • Vigenère Cipher- Example
  • Breaking the Vigenère Cipher
  • Playfair Cipher
  • ADFGVX Cipher
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • The Enigma Machine
  • CrypTool
  • Symmetric Cryptography
  • Information Theory
  • Information Theory Cryptography Concepts
  • Kerckhoffs's Principle
  • Substitution
  • Transposition
  • Binary Math
  • Binary &
  • Binary OR
  • Binary XOR
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
  • Basic Facts of the Feistel Function
  • The Feistel Function
  • Unbalanced Feistel Cipher
  • Data Encryption Standard (DES)
  • 3DES
  • DESx
  • Whitening
  • Advanced Encryption Standard (AES)
  • AES General Overview
  • AES Specifics
  • Blowfish
  • Serpent
  • Twofish
  • Skipjack
  • International Data Encryption Algorithm (IDEA)
  • CAST
  • Tiny Encryption Algorithm (TEA)
  • SHARK
  • Symmetric Algorithm Methods
  • Electronic Codebook (ECB)
  • Cipher-Block Chaining (CBC)
  • Propagating Cipher-Block Chaining (PCBC)
  • Cipher Feedback (CFB)
  • Output Feedback (OFB)
  • Counter (CTR)
  • Initialization Vector (IV)
  • Symmetric Stream Ciphers
  • Example of Symmetric Stream Ciphers- RC4
  • Example of Symmetric Stream Ciphers- FISH
  • Example of Symmetric Stream Ciphers- PIKE
  • Hash Function
  • Hash – Salt
  • MD5
  • The MD5 Algorithm
  • MD6
  • Secure Hash Algorithm (SHA)
  • FORK-256
  • RIPEMD-160
  • GOST
  • Tiger
  • MAC & HMAC
  • CryptoBench
  • Asymmetric Encryption
  • Basic Number Facts
  • Prime Numbers
  • Co-Prime Numbers
  • Euler's Totient
  • Modulus Operator
  • Fibonacci Numbers
  • Birthday Theorem
  • Birthday Paradox
  • Birthday Paradox- Probability
  • Birthday Attack
  • Random Number Generator
  • Classification of Random Number Generator
  • Traits of a Good PRNG
  • Naor-Reingold & Mersenne Twister Pseudorandom Function
  • Linear Congruential Generator
  • Lehmer Random Number Generator
  • Lagged Fibonacci Generator (LFG)
  • Blum Blum Shub
  • Yarrow
  • Fortuna
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
  • RSA – How it Works
  • RSA Example
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
  • Signing with DSA
  • Elliptic Curve
  • Elliptic Curve Variations
  • Elgamal
  • CrypTool
  • FIPS Standards
  • Digital Signatures
  • What is a Digital Certificate?
  • Digital Certificates
  • X.509
  • X.509 Certificates
  • X.509 Certificate Content
  • X.509 Certificate File Extensions
  • Certificate Authority (CA)
  • Certificate Authority – Verisign
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates & Web Servers
  • Microsoft Certificate Services
  • Windows Certificates- certmgr.msc
  • Authentication
  • Password Authentication Protocol (PAP)
  • Shiva Password Authentication Protocol (S-PAP)
  • Challenge-Handshake Authentication Protocol (CHAP)
  • Kerberos
  • Components of the Kerberos System
  • Kerberos Authentication Process
  • Pretty Good Privacy (PGP)
  • PGP Certificates
  • Wi-Fi Encryption
  • Wired Equivalent Privacy (WEP)
  • WPA – Wi-Fi Protected Access
  • WPA2
  • SSL
  • TLS
  • Virtual Private Network (VPN)
  • Point-to-Point Tunneling Protocol (PPTP)
  • PPTP VPN
  • Layer 2 Tunneling Protocol VPN
  • Internet Protocol Security VPN
  • SSL/TLS VPN
  • Encrypting Files
  • Backing up the EFS key
  • Restoring the EFS Key
  • BitLocker
  • BitLocker- Screenshot
  • Disk Encryption Software- VeraCrypt
  • Common Cryptography Mistakes
  • Steganography
  • Steganography Terms
  • Historical Steganography
  • Steganography Details
  • Other Forms of Steganography
  • How to Embed?
  • Steganographic File Systems
  • Steganography Implementations
  • Demonstration
  • Steganalysis
  • Steganalysis – Raw Quick Pair
  • Steganalysis – Chi-Square Analysis
  • Steganalysis – Audio Steganalysis
  • Steganography Detection Tools
  • National Security Agency & Cryptography
  • NSA Suite A Encryption Algorithms
  • NSA Suite B Encryption Algorithms
  • National Security Agency- Type 1 Algorithms
  • National Security Agency- Type 2 Algorithms
  • National Security Agency- Type 3 Algorithms
  • National Security Agency- Type 4 Algorithms
  • Unbreakable Encryption
  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
  • Cracking Modern Cryptography- Chosen Plaintext Attack
  • Cracking Modern Cryptography- Ciphertext-only & Related-key Attack
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools

FAQs

A- After this course-

  • You will be able to do audit management, human capital management, governance, IS controls, strategic program development & the financial expertise vital to leading a highly successful IS program.
  • You will learn how to apply technical knowledge to an information security executive's day-to-day work.
  • You will be able to deliver a successful transition to the uppermost ranks of information security management.

A- As security breaches continue to impact the bottom lines of significant businesses & institutions around the world, the role of the CISO is taking on new prominence & fuelling existing controversies over where responsibility for data security ultimately lies within the organization, which is the responsibility of the chief information security officer.

A- GDPR stands for General Data Protection Regulation. The exciting yet challenging fact is that it applies to all organizations processing subjects' personal data within the European Union, irrespective of their location.

A- Incorporated in 2016, Radiant Techlearning is a technology training company dedicated to Technology & Technical skill development of the employees of our trusted clients from all across the globe. We believe in building skills for individuals, teams, and organizations so that they remain ahead in the cutting-edge world of competitiveness driven by technology & ability to transform.

We are a team of professional technical training experts & consultants with insight into a spectacular didactic approach toward training & development. 

Our training delivery methodology will enable you to attain knowledge & proficiency in a particular domain rather than finding scattered information on different platforms. Our trainers have the patience & ability to explain complex concepts simply with depth & width of knowledge. Each of our training programs is fully updated to meet industry needs.

One can enroll in our classroom or live virtual instructor-led training programs.

All the essential ingredients required for a successful training program, such as certified instructors & Consultants, the latest Content, hands-on experience with the technology, technical experts & pre & post-assessments to test the performance, are incorporated in our learning programs. 

Since the emphasis is on hands-on experience, we choose Industry relevant high-value projects related to each course. During your system, you will get personalized attention from your respective experts. Our experts will also share ideal practices & will give you direction to score high & perform better in your certification exams. 

To ensure your success, we provide support sessions even after the training program. 

You would also be awarded a course completion certificate recognized by the industry after accomplishment of the course & the assignment.

A- Radiant Techlearning is headquartered in the Electronic city & technology hub of Northern India, Noida, surrounded by several large multinational, medium & small Software companies. 

We have offices located all across the country & partners across the globe.  

A- Radiant Techlearning is receptive to new ideas & always believes in an innovative approach that makes learning easy & effective. We stand firm with highly qualified & certified technology Consultants, trainers & developers who believe in the amalgamation of practical & creative training to groom technical skills.

Our training programs are practically oriented with 70% – 80% hands-on training technology tools. Our training program concentrates on one-on-one interaction with each participant, the latest Content in the curriculum, real-time projects & case studies during the training program. 

Our experts will also share ideal practices & will give you direction to score high & perform better in your certification exams. 

To ensure your success, we provide support sessions even after the training program. 

You would also be awarded a course completion certificate recognized by the industry after accomplishment of the course & the assignment.

A- Radiant Techlearning is receptive to new ideas & always believes in an innovative approach that makes learning easy & effective. We stand firm with highly qualified & certified technology Consultants, trainers & developers who believe in the amalgamation of practical & creative training to groom technical skills.

Our training programs are practically oriented with 70% – 80% hands-on training technology tools. Our training program concentrates on one-on-one interaction with each participant, the latest Content in the curriculum, real-time projects & case studies during the training program. 

Our experts will also share ideal practices & will give you direction to score high & perform better in your certification exams. 

To ensure your success, we provide support sessions even after the training program. 

You would also be awarded a course completion certificate recognized by the industry after accomplishment of the course & the assignment.

A- Radiant has highly intensive selection criteria for Technology Trainers & Consultants who deliver training programs. Our trainers & consultants undergo rigorous technical & behavioral interviews & assessment processes before they are onboarded in the company. 

Our Technology experts/trainers & consultants carry deep-dive knowledge in the technical subject & are certified by the OEM.

Our training programs are practically oriented with 70% – 80% hands-on training technology tools. Our training program concentrates on one-on-one interaction with each participant, the latest Content in the curriculum, real-time projects & case studies during the training program. 

Our faculty will provide you the knowledge of each course from the fundamental level in an easy way & you are free to ask your doubts any time your respective faculty.

Our trainers have the patience & ability to explain complex concepts simplistically with depth & width of knowledge.

To ensure quality learning, we provide support sessions even after the training program. 

A- Radiant team of experts would be available via the email Support@radianttechlearning.com to answer your technical questions, even after the training program.

We also conduct 3 – 4-hour online sessions after two weeks of the training program to respond to your queries & projects assigned to you.

Send a Message.


  • Enroll