MCSEClasses Certification Training Boot Camp MCSE MCSD MCDBA Cisco CIW Linux Oracle Java Security Military Discounts Testimonials About Us Linux/Unix Certification MCSD Certification Home MCSE Certification MCDBA Certification Cisco Certification Security Certification Java Certification Oracle® Certification CIW Certification Jobs Boot Camp Financing Boot Camp Pricing Boot Camp Technical Schedule Contact Us

EC-Council Certified Encryption Specialist (ECES)

Course Length: 5 days
Certifications: ECES
Number of Exams: 1

Class Schedule
Call for Class Schedule
  • Hands-on instruction by a certified instructor
  • Includes all course materials
  • The EC-Council Certified Encryption Specialist (E|CES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

    • Overview of other algorithms such as Blowfish, Twofish, and Skipjack
    • Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
    • Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
    • Significant concepts such as diffusion, confusion, and Kerkchoff's principle.

    Participants will also be provided a practical application of the following:

    • How to set up a VPN
    • Encrypt a drive
    • Hands-on experience with steganography
    • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.

    What Will You Learn

    • Types of Encryption Standards and their differences.
    • How to select the best standard for your organization.
    • How to enhance your pen-testing knowledge in encryption.
    • Correct and incorrect deployment of encryption technologies.
    • Common mistakes made in implementing encryption technologies.
    • Best practices when implementing encryption technologies.

    Who Should Attend

    Anyone involved in selecting, implementing VPN's or digital certificates should attend this course first. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

    This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don't attempt to crack cryptography. A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

    Course Outline

    Introduction and History of Cryptography
    • What is Cryptography?
    • History
    • Mono-Alphabet Substitution
    • Caesar Cipher
    • Atbash Cipher
    • ROT 13
    • Scytale
    • Single Substitution Weaknesses
    • Multi-Alphabet Substitution
    • Cipher Disk
    • Vigenère Cipher
    • Vigenère Cipher: Example
    • Breaking the Vigenère Cipher
    • Playfair
    • The ADFGVX cipher
    • The Enigma Machine
    • CrypTool
    Symmetric Cryptography & Hashes
    • Symmetric Cryptography
    • Information Theory
    • Information Theory Cryptography Concepts
    • Kerckhoffs's Principle
    • Substitution
    • Transposition
    • Substitution and Transposition
    • Binary M
    • ath
    • Binary AND
    • Binary OR
    • Binary XOR
    • Block Cipher vs. Stream Cipher
    • Symmetric Block Cipher Algorithms
    • Basic Facts of the Feistel Function
    • The Feistel Function
    • A Simple View of a Single Round
    • Unbalanced Feistel Cipher
    • DES
    • 3DES
    • DESx
    • Whitening
    • AES
    • AES General Overview
    • AES Specifics
    • Blowfish
    • Serpent
    • Twofish
    • Skipjack
    • IDEA
    • Symmetric Algorithm Methods
    • Electronic Codebook (ECB)
    • Cipher-Block Chaining (CBC)
    • Propagating Cipher-Block Chaining (PCBC)
    • Cipher Feedback (CFB)
    • Output Feedback (OFB)
    • Counter (CTR)
    • Initialization Vector (IV)
    • Symmetric Stream Ciphers
    • Example of Symmetric Stream Ciphers: RC4
    • Example of Symmetric Stream Ciphers: FISH
    • Example of Symmetric Stream Ciphers: PIKE
    • Hash
    • Hash - Salt
    • MD5
    • The MD5 Algorithm
    • MD6
    • Secure Hash Algorithm (SHA)
    • Fork 256
    • RIPEMD - 160
    • GOST
    • Tiger
    • CryptoBench
    Number Theory and Asymmetric Cryptography
    • Asymmetric Encryption
    • Basic Number Facts
    • Prime Numbers
    • Co-Prime
    • Eulers Totient
    • Modulus Operator
    • Fibonacci Numbers
    • Birthday Problem
    • Birthday Theorem
    • Birthday Attack
    • Random Number Generators
    • Classification of Random Number Generators
    • Naor-Reingold and Mersenne Twister Pseudorandom Function
    • Linear Congruential Generator
    • Lehmer Random Number Generator
    • Lagged Fibonacci Generator
    • Diffie-Hellman
    • Rivest Shamir Adleman (RSA)
    • RSA - How it Works
    • RSA Example
    • Menezes-Qu-Vanstone
    • Digital Signature Algorithm
    • Signing with DSA
    • Elliptic Curve
    • Elliptic Curve Variations
    • Elgamal
    • CrypTool
    Applications of Cryptography
    • Digital Signatures
    • What is a Digital Certificate?
    • Digital Certificates
    • X.509
    • X.509 Certificates
    • X.509 Certificate Content
    • X.509 Certificate File Extensions
    • Certificate Authority (CA)
    • Registration Authority (RA)
    • Public Key Infrastructure (PKI)
    • Digital Certificate Terminology
    • Server-based Certificate Validation Protocol
    • Digital Certificate Management
    • Trust Models
    • Certificates and Web Servers
    • Microsoft Certificate Services
    • Windows Certificates: certmgr.msc
    • Authentication
    • Password Authentication Protocol (PAP)
    • Shiva Password Authentication Protocol (S-PAP)
    • Challenge-Handshake Authentication Protocol (CHAP)
    • Kerberos
    • Components of Kerberos System
    • Pretty Good Privacy (PGP)
    • PGP Certificates
    • Wifi Encryption
    • Wired Equivalent Privacy (WEP)
    • WPA - Wi-Fi Protected Access
    • WPA2
    • SSL
    • TLS
    • Virtual Private Network (VPN)
    • Point-to-Point Tunneling Protocol (PPTP)
    • PPTP VPN
    • Layer 2 Tunneling Protocol VPN
    • Internet Protocol Security VPN
    • SSL/VPN
    • Encrypting Files
    • Backing up the EFS key
    • Restoring the EFS Key
    • Bitlocker
    • Bitlocker: Screenshot
    • Disk Encryption Software: Truecrypt
    • Steganography
    • Steganography Terms
    • Historical Steganography
    • Steganography Details
    • Other Forms of Steganography
    • Steganography Implementations
    • Demonstration
    • Steganalysis
    • Steganalysis - Raw Quick Pair
    • Steganalysis - Chi-Square Analysis
    • Steganalysis - Audio Steganalysis
    • Steganography Detection Tools
    • National Security Agency and Cryptography
    • NSA Suite A Encryption Algorithms
    • NSA Suite B Encryption Algorithms
    • National Security Agency: Type 1 Algorithms
    • National Security Agency: Type 2 Algorithms
    • National Security Agency: Type 3 Algorithms
    • National Security Agency: Type 4 Algorithms
    • Unbreakable Encryption
    Applications of Cryptography
    • Breaking Ciphers
    • Cryptanalysis
    • Frequency Analysis
    • Kasiski
    • Cracking Modern Cryptography
    • Cracking Modern Cryptography: Chosen Plaintext Attack
    • Linear Cryptanalysis
    • Differential Cryptanalysis
    • Integral Cryptanalysis
    • Cryptanalysis Resources
    • Cryptanalysis Success
    • Rainbow Tables
    • Password Cracking
    • Tools is your best choice for Encryption Specialist Training, Encryption Specialist Training training, Encryption Specialist Training certification, Encryption Specialist Training certification boot camp, Encryption Specialist Training boot camp, Encryption Specialist Training certification training, Encryption Specialist Training boot camp training, Encryption Specialist Training boot camp certification, Encryption Specialist Training certification course, Encryption Specialist Training course, training Encryption Specialist Training, certification Encryption Specialist Training, boot camp Encryption Specialist Training, certification Encryption Specialist Training boot camp, certification Encryption Specialist Training training, boot camp Encryption Specialist Training training, certification Encryption Specialist Training course.

    mcseclasses home | technical schedule | application schedule | class outlines | mcse, mcdba, mcsd training | microsoft .net | cisco certification | security training | ced solutions oracle® certification training | linux, unix, aix | comptia certification | webmaster training | pricing | locations | financing | instructors needed | e-mail us

    Search classes by keyword:

    Search classes by category:

    Copyright © 2021 CED Solutions. CED Solutions Refund Policy. All Rights Reserved.

    MCSE certification boot camps and courses are offered in these select cities: Albany MCSE, Albuquerque MCSE, Alexandria MCSE, Anchorage MCSE, Atlanta MCSE, Austin MCSE, Billings MCSE, Birmingham MCSE, Bismarck MCSE, Boise MCSE, Boston MCSE, Charleston MCSE, Charlotte MCSE, Cheyenne MCSE, Chicago MCSE, Cincinnati MCSE, Cleveland MCSE, Columbia MCSE, Columbus MCSE, Dallas MCSE, Denver MCSE, Des Moines MCSE, Detroit MCSE, Hartford MCSE, Honolulu MCSE, Houston MCSE, Indianapolis MCSE, Jackson MCSE, Kansas City MCSE, Las Cruces MCSE, Lincoln MCSE, Little Rock MCSE, Los Angeles MCSE, Louisville MCSE, Madison MCSE, Milwaukee MCSE, Minneapolis MCSE, Montpelier MCSE, New Orleans MCSE, New York City MCSE, Norfolk MCSE, Oklahoma City MCSE, Omaha MCSE, Philadelphia MCSE, Phoenix MCSE, Pierre MCSE, Pittsburgh MCSE, Portland MCSE, Princeton MCSE, Providence MCSE, Raleigh MCSE, Richmond MCSE, Sacramento MCSE, Salt Lake City MCSE, San Antonio MCSE, San Diego MCSE, San Francisco MCSE, San Jose MCSE, Seattle MCSE, Stamford MCSE, Tulsa MCSE, Washington MCSE, Wilmington MCSE.

    MCSE Canada Boot Camps : mcse Calgary, mcse Edmonton, mcse Halifax, mcse Hamilton, mcse Kitchener, mcse London, mcse Montreal, mcse Ottawa, mcse Quebec City, mcse Toronto, mcse Vancouver, mcse Winnipeg.

    CED Solutions offers MCSE certification boot camps and courses in the United States: MCSE Alabama, MCSE Alaska, MCSE Arizona, MCSE Arkansas, MCSE California, MCSE Colorado, MCSE Connecticut, MCSE District of Columbia, MCSE Delaware, MCSE Georgia, MCSE Hawaii, MCSE Idaho, MCSE Illinois, MCSE Indiana, MCSE Iowa, MCSE Kansas, MCSE Kentucky, MCSE Louisiana, MCSE Maine, MCSE Massachusetts, MCSE Michigan, MCSE Minnesota, MCSE Mississippi, MCSE Missouri, MCSE Montana, MCSE Nebraska, MCSE New Jersey, MCSE New Mexico, MCSE New York, MCSE North Carolina, MCSE North Dakota, MCSE Ohio, MCSE Oklahoma, MCSE Oregon, MCSE Pennsylvania, MCSE Rhode Island, MCSE South Carolina, MCSE South Dakota, MCSE Texas, MCSE Utah, MCSE Vermont, MCSE Virginia, MCSE Washington, MCSE West Virginia, MCSE Wisconsin, MCSE Wyoming.

    MCSE Canada Boot Camps : Alberta mcse, British Columbia mcse, Manitoba mcse, New Brunswick mcse, Newfoundland mcse, Nova Scotia mcse, Ontario mcse, Saskatchewan mcse. Quebec mcse.