EC-Council Certified Encryption Specialist

ec-council certified encryption specialist

ECES Course Description


Course Description

The EC-Council Certified Encryption Specialist (E|CES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:


  • Overview of other algorithms such as Blowfish, Twofish, and Skipjack
  • Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
  • Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
  • Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.



Types of Encryption Strandards and their Differences

Participants will also be provided a practical application of the following:

  • How to set up a VPN
  • Encrypt a drive
  • Hands-on experience with steganography
  • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.

Attend EC-Council Certified Encryption Specialist (E|CES) training program


Who Should Attend

Anyone involved in selecting, implementing VPN’s or digital certificates should attend this course first.  Without understanding the cryptography at some depth, people are limited to following marketing hype.  Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely.  Many penetration testing professionals testing usually don’t attempt to crack cryptography.  A basic knowledge of cryptanalysis is very beneficial to any penetration testing.


What Will You Learn


Author's Bio

Chuck Easttom is the author of 13 computer science books including 2 computer security textbooks used at universities around the globe and translated into several languages. He also holds a host of IT certifications including MCP, MCSA, MCSE, MCAD, MCTS (Windows 7, Windows Server 2008, SQL Server 2008, and Visual Studio 2010), MCITP (Windows 7 and SQL Server 2008), MCDBA, MCT, A+, Network+, Linux+,iNet+, Server+, Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), EC-Council's Certified Security Analyst (ECSA), ECI, CISSP, and ISSAP. He currently has 7 provisional patents, all related to computer science and 4 related to computer security. One of those patents regards a new method of steganography, another regards a new approach to detecting spyware, and yet another involves the invention of a new, more stable file system.

Mr. Easttom has taught various security-related courses for several years and has over 10 years of teaching experience. He is also a frequent consultant on various computer-related court cases including both criminal and patent cases. While Mr. Easttom has a broad range of security expertise, his passion has always been cryptography.


Attend ECES Exam and Get EC-Council Certified Encryption Specialist Certification

Exam info

  • Number of Questions: 50
  • Test Duration: 2 Hours
  • Test Format: Multiple Choice
  • Test Delivery: EC-Council Exam Center (ECC EXAM)
  • Course/Class Duration: 3 days / 20 hours


Become a Information Security Professional with EC-Council Training Certification Programs

What Will You Learn

 Types of Encryption Strandards and their Differences  How to Enhance your Pen Testing Knowledge in Encryption
 Cryptography Best Practices

 Common Cryptography Mistakes

  • Types of Encryption Standards and their differences.
  • How to select the best standard for your organization.
  • How to enhance your pen-testing knowledge in encryption.
  • Correct and incorrect deployment of encryption technologies.
  • Common mistakes made in implementing encryption technologies.
  • Best practices when implementing encryption technologies.