EC-council Certified Encryption Specialist

  • Course Code
    ECSE-005

EC-council Certified Encryption Specialist

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

   -  Overview of other algorithms such as Blowfish, Twofish, and Skipjack
   -  Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others
   -  Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA
   -  Significant concepts such as diffusion, confusion, and Kerkchoff’s principle

Participants will also be provided a practical application of the following:

   -  How to set up a VPN
   -  Encrypt a drive
   -  Hands-on experience with steganography
   -  Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar 
      cipher to modern day algorithms such as AES and RSA

Learning Outcomes

    • Types of Encryption Standards and their differences
    • How to select the best standard for your organization
    • How to enhance your pen-testing knowledge in encryption
    • Correct and incorrect deployment of encryption technologies
    • Common mistakes made in implementing encryption technologies
    • Best practices when implementing encryption technologies

Course Contents

    • Introduction and History of Cryptography
    • Symmetric Cryptography and Hashes
    • Number theory and Asymmetric Cryptography
    • Applications of Cryptography part 1
    • Applications of Cryptography part 2

Our Methodology

    • Make coaching and monitoring innovative and using modern
    • Media training also using on the go training by using interactive means and focusing on
    • The exercises, practical applications and real situations study
    • Live delivery method, instructor-led training
    • Experienced consultant, trainers, and professional
    • Qualified trainer with high-level experience

Attendance Reports

    • Send daily attendance reports to training departments
    • Send full attendance report to training dep. by the end of the course
    • Attend 100 % from the course days also provide daily
    • Issue attendance certificate for participant who attend minimum 80% from the course duration

Pre/Post Reports

    • Pre- assessment before starting training
    • Post assessment after finish training
    • Full report for the deferent between Pre-& Post assessment

Who Should Attend

    • Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select
    • A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology
    • This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography
Date City Venue Language Price Status Register
07 Jul 11 Jul - 2024 Cairo 5 Stars Hotel English $ 3750 Planned Register
11 Aug 15 Aug - 2024 Sharm El Sheikh 5 Stars Hotel English $ 3750 Planned Register
06 Oct 10 Oct - 2024 Dubai 5 Stars Hotel English $ 4000 Planned Register
01 Dec 05 Dec - 2024 Dubai 5 Stars Hotel English $ 4000 Planned Register
22 Dec 26 Dec - 2024 Doha 5 Stars Hotel English $ 4000 Planned Register