EC-Council - EC-Council Certified Encryption Specialist

Duration

Duration:

Only 2 Days

Method

Method:

Classroom / Online / Hybrid

Next date

Next date:

24/6/2024 (Monday)

Benefits

Other accelerated training providers rely heavily on lecture and independent self-testing and study.

Effective technical instruction must be highly varied and interactive to keep attention levels high, promote camaraderie and teamwork between the students and instructor, and solidify knowledge through hands-on learning.

Firebrand Training provides instruction to meet every learning need:

  • Intensive group instruction
  • One-on-one instruction attention
  • Hands-on labs
  • Lab partner and group exercises
  • Question and answer drills
  • Independent study

Curriculum

1. Introduction and History of Cryptography

  • What is Cryptography?
  • History
  • Mono-Alphabet Substitution
    • Caesar Cipher
    • Atbash Cipher
    • ROT 13
    • Scytale
    • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
    • Cipher Disk
    • Vigenère Cipher
      • Vigenère Cipher: Example
      • Breaking the Vigenère Cipher
    • Playfair
    • The ADFGVX cipher
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • The Enigma Machine
  • CrypTool

2. Symmetric Cryptography & Hashes

  • Symmetric Cryptography
  • Information Theory
    • Information Theory Cryptography Concepts
  • Kerckhoffs's Principle
  • Substitution
  • Transposition
  • Substitution and Transposition
  • Binary Math
    • Binary AND
    • Binary OR
    • Binary XOR
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
    • Basic Facts of the Feistel Function
      • The Feistel Function
      • Unbalanced Feistel Cipher
    • Data Encryption Standard (DES)
    • 3DES
      • DESx
      • Whitening
    • Advanced Encryption Standard (AES)
      • AES General Overview
      • AES Specifics
    • Blowfish
    • Serpent
    • Twofish
    • Skipjack
    • International Data Encryption Algorithm (IDEA)
    • CAST
    • Tiny Encryption Algorithm (TEA)
    • SHARK
  • Symmetric Algorithm Methods
    • Electronic Codebook (ECB)
    • Cipher-Block Chaining (CBC)
    • Propagating Cipher-Block Chaining (PCBC)
    • Cipher Feedback (CFB)
    • Output Feedback (OFB)
    • Counter (CTR)
    • Initialisation Vector (IV)
  • Symmetric Stream Ciphers
    • Example of Symmetric Stream Ciphers: RC4
    • Example of Symmetric Stream Ciphers: FISH
    • Example of Symmetric Stream Ciphers: PIKE
  • Hash Function
    • Hash - Salt
    • MD5
      • The MD5 Algorithm
    • MD6
    • Secure Hash Algorithm (SHA)
    • Fork 256
    • RIPEMD – 160
    • GOST
    • Tiger
  • CryptoBench

3 Number Theory and Asymmetric Cryptography

  • Asymmetric Encryption
  • Basic Number Facts
    • Prime Numbers
    • Co-Prime
    • Eulers Totient
    • Modulus Operator
    • Fibonacci Numbers
  • Birthday Theorem
    • Birthday Paradox
      • Birthday Paradox: Probability
    • Birthday Attack
  • Random Number Generators
    • Classification of Random Number Generators
    • Traits of a Good PRNG
    • Naor-Reingold and Mersenne Twister Pseudorandom Function
    • Linear Congruential Generator
    • Lehmer Random Number Generator
    • Lagged Fibonacci Generator (LFG)
    • Blum Blum Shub
    • Yarrow
    • Fortuna
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
    • RSA – How it Works
    • RSA Example
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
    • Signing with DSA
  • Elliptic Curve
    • Elliptic Curve Variations
  • Elgamal
  • CrypTool

4 Applications of Cryptography

  • Digital Signatures
  • What is a Digital Certificate?
    • Digital Certificates
      • X.509
      • X.509 Certificates
      • X.509 Certificate Content
      • X.509 Certificate File Extensions
  • Certificate Authority (CA)
    • Certificate Authority - Verisign
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
    • Password Authentication Protocol (PAP)
    • Shiva Password Authentication Protocol (S-PAP)
    • Challenge-Handshake Authentication Protocol (CHAP)
    • Kerberos
      • Components of Kerberos System
      • Kerberos Authentication Process
  • Pretty Good Privacy (PGP)
    • PGP Certificates
  • Wifi Encryption
    • Wired Equivalent Privacy (WEP)
    • WPA - Wi-Fi Protected Access
    • WPA2
  • SSL
  • TLS
  • Virtual Private Network (VPN)
    • Point-to-Point Tunneling Protocol (PPTP)
      • PPTP VPN
    • Layer 2 Tunneling Protocol VPN
    • Internet Protocol Security VPN
    • SSL/VPN
  • Encrypting Files
    • Backing up the EFS key
    • Restoring the EFS Key
  • Bitlocker
    • Bitlocker: Screenshot
  • Disk Encryption Software: VeraCrypt
  • Steganography
    • Steganography Terms
    • Historical Steganography
    • Steganography Details
    • Other Forms of Steganography
    • How to Embed?
    • Steganographic File Systems
    • Steganography Implementations
    • Demonstration
  • Steganalysis
    • Steganalysis – Raw Quick Pair
    • Steganalysis - Chi-Square Analysis
    • Steganalysis - Audio Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
    • NSA Suite A Encryption Algorithms
    • NSA Suite B Encryption Algorithms
    • National Security Agency: Type 1 Algorithms
    • National Security Agency: Type 2 Algorithms
    • National Security Agency: Type 3 Algorithms
    • National Security Agency: Type 4 Algorithms
  • Unbreakable Encryption

5. Cryptanalysis

  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
    • Cracking Modern Cryptography: Chosen Plaintext Attack
    • Cracking Modern Cryptography: Ciphertext-only and Related-key Attack
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools

Exam Track

As part of this accelerated course, you'll sit the following exam at the Firebrand Training centre, covered by your Certification Guarantee:

EC-Council Certified Encryption Specialist (ECES) exam code (212-81)

  • Exam code: 212-81
  • Number of questions: 50
  • Passing score: 70%
  • Duration: 2 hours
  • Format: Multiple-choice

What's Included

Your accelerated course includes:

  • Accommodation *
  • Meals, unlimited snacks, beverages, tea and coffee *
  • On-site exams **
  • Exam vouchers **
  • Practice tests **
  • Certification Guarantee ***
  • Courseware
  • Up-to 12 hours of instructor-led training each day
  • 24-hour lab access
  • Digital courseware **
  • * For residential training only. Accommodation is included from the night before the course starts. This doesn't apply for online courses.
  • ** Some exceptions apply. Please refer to the Exam Track or speak with our experts
  • *** Pass first time or train again free as many times as it takes, unlimited for 1 year. Just pay for accommodation, exams, and incidental costs.

Prerequisites

There are no formal prerequisites for this accelerated course.

Unsure whether you meet the prerequisites? Don’t worry. Your training consultant will discuss your background with you to understand if this course is right for you.

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 134561 students and asked them all to review our Accelerated Learning. Currently, 96.41% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.


"CEH is a very hard training, but it's doable thanks to the friendly employees at Firebrand and the accommodations."
Kas Ramjiawan, ITQM. (4/3/2024 (Monday) to 8/3/2024 (Friday))

"Heavy stuff! Long days and almost no time for some leisure or preparing for exam... I thought there was more hands-on training involved."
MR. (4/3/2024 (Monday) to 8/3/2024 (Friday))

"A great learning experience."
Alan Crowdy, GNS . (5/12/2019 (Thursday) to 7/12/2019 (Saturday))

"Firebrand is providing me with a condensed training always fitting my tight timetable with a high success rate on the certification."
Anonymous (5/12/2019 (Thursday) to 7/12/2019 (Saturday))

"In short it was a very pleasant stay at the hotel, and the instructor was great."
Anonymous (16/4/2018 (Monday) to 20/4/2018 (Friday))

Course Dates

Start

Finish

Status

Location

Book now

19/2/2024 (Monday)

20/2/2024 (Tuesday)

Finished - Leave feedback

-

 

24/6/2024 (Monday)

25/6/2024 (Tuesday)

Wait list

Nationwide

 

5/8/2024 (Monday)

6/8/2024 (Tuesday)

Limited availability

Nationwide

 

16/9/2024 (Monday)

17/9/2024 (Tuesday)

Open

Nationwide

 

28/10/2024 (Monday)

29/10/2024 (Tuesday)

Open

Nationwide

 

9/12/2024 (Monday)

10/12/2024 (Tuesday)

Open

Nationwide

 

Latest Reviews from our students