EC-Council Certified Encryption Specialist (ECES)
On Demand $2,195.00
Virtual Live

Course Description
Secure organizations employ multiple levels of encryption – database encryption, VoIP encryption, portable storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption – server/desktop, network link encryption, web server encryption, tape backup encryption, and many more. Some of the most recent attacks that have had serious consequences share one thing in common – they all had either none or little effective encryption. This resulted in thousands of users being affected and hundreds of millions in losses. It resulted in a serious decline in brand value and public embarrassment.
Program Objectives
- Types of Encryption Standards and their differences
- How to select the best standard for your organization
- How to enhance your pen-testing knowledge in encryption
- Correct and incorrect deployment of encryption technologies
- Common mistakes made in implementing encryption technologies
- Best practices when implementing encryption technologies
Prerequisites
- No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.
Course Features
- Lectures 74
- Quizzes 0
- Duration 40 hours
- Skill level All levels
- Language English
- Students 329
- Certificate No
- Assessments Yes
-
01. Introduction and History of Cryptography
-
02. Symmetric Cryptography & Hashes
-
03. Number Theory and Asymmetric Cryptography
-
04. Applications of Cryptography
- FIPS Standards
- Digital Signatures
- What is a Digital Certificate?
- Certificate Authority (CA)
- Registration Authority (RA)
- Public Key Infrastructure (PKI)
- Digital Certificate Terminology
- Server-based Certificate Validation Protocol
- Digital Certificate Management
- Trust Models
- Certificates and Web Servers
- Microsoft Certificate Services
- Windows Certificates: certmgr.msc
- Authentication
- Pretty Good Privacy (PGP)
- Wi-Fi Encryption
- SSL
- TLS
- Virtual Private Network (VPN)
- Encrypting Files
- BitLocker
- Disk Encryption Software: VeraCrypt
- Common Cryptography Mistakes
- Steganography
- Steganalysis
- Steganography Detection Tools
- National Security Agency and Cryptography
- Unbreakable Encryption
-
05. Cryptanalysis