ECES-Banner-01

EC-Council Certified Encryption Specialist (ECES)

Course Description

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:

  • Overview of other algorithms such as Blowfish, Twofish, and Skipjack
  • Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
  • Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
  • Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.

Participants will also be provided a practical application of the following:

  • How to set up a VPN
  • Encrypt a drive
  • Hands-on experience with steganography
  • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.

Author’s Bio

ECES-AUTHORS-BIOChuck Easttom is the author of 13 computer science books including 2 computer security textbooks used at universities around the globe and translated into several languages. He also holds a host of IT certifications including MCP, MCSA, MCSE, MCAD, MCTS (Windows 7, Windows Server 2008, SQL Server 2008, and Visual Studio 2010), MCITP (Windows 7 and SQL Server 2008), MCDBA, MCT, A+, Network+, Linux+,iNet+, Server+, Certified Ethical Hacker (CEH), Computer Hacking Forensic Investigator (CHFI), EC-Council’s Certified Security Analyst (ECSA), ECI, CISSP, and ISSAP. He currently has 7 provisional patents, all related to computer science and 4 related to computer security. One of those patents regards a new method of steganography, another regards a new approach to detecting spyware, and yet another involves the invention of a new, more stable file system.

Mr. Easttom has taught various security-related courses for several years and has over 10 years of teaching experience. He is also a frequent consultant on various computer-related court cases including both criminal and patent cases. While Mr. Easttom has a broad range of security expertise, his passion has always been cryptography.

 

Who Should Attend

who-should-attendAnyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

 

What you will learn

  • Types of Encryption Standards and their differences
  • How to select the best standard for your organization
  • How to enhance your pen-testing knowledge in encryption
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies

 

Exam Info

Number of Questions:50
Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery:EC-Council Exam Center (ECC EXAM)
Course/Class Duration: 3 days / 20 hours

ECES Course Outline

01. Introduction and History of Cryptography02. Symmetric Cryptography & Hashes03. Number Theory and Asymmetric Cryptography04. Applications of Cryptography05. Applications of Cryptography

Introduction and History of Cryptography

  • What is Cryptography?
  • History
  • Mono-Alphabet Substitution
  • Caesar Cipher
  • Atbash Cipher
  • ROT 13
  • Scytale
  • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
  • Cipher Disk
  • Vigenère Cipher
  • Vigenère Cipher: Example
  • Breaking the Vigenère Cipher
  • Playfair
  • The ADFGVX cipher
  • The Enigma Machine
  • CrypTool

Symmetric Cryptography & Hashes

  • Symmetric Cryptography
  • Information Theory
  • Information Theory Cryptography Concepts
  • Kerckhoffs’s Principle
  • Substitution
  • Transposition
  • Substitution and Transposition
  • Binary M
  • ath
  • Binary AND
  • Binary OR
  • Binary XOR
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
  • Basic Facts of the Feistel Function
  • The Feistel Function
  • A Simple View of a Single Round
  • Unbalanced Feistel Cipher
  • DES
  • 3DES
  • DESx
  • Whitening
  • AES
  • AES General Overview
  • AES Specifics
  • Blowfish
  • Serpent
  • Twofish
  • Skipjack
  • IDEA
  • Symmetric Algorithm Methods
  • Electronic Codebook (ECB)
  • Cipher-Block Chaining (CBC)
  • Propagating Cipher-Block Chaining (PCBC)
  • Cipher Feedback (CFB)
  • Output Feedback (OFB)
  • Counter (CTR)
  • Initialization Vector (IV)
  • Symmetric Stream Ciphers
  • Example of Symmetric Stream Ciphers: RC4
  • Example of Symmetric Stream Ciphers: FISH
  • Example of Symmetric Stream Ciphers: PIKE
  • Hash
  • Hash – Salt
  • MD5
  • The MD5 Algorithm
  • MD6
  • Secure Hash Algorithm (SHA)
  • Fork 256
  • RIPEMD – 160
  • GOST
  • Tiger
  • CryptoBench

Number Theory and Asymmetric Cryptography

  • Asymmetric Encryption
  • Basic Number Facts
  • Prime Numbers
  • Co-Prime
  • Eulers Totient
  • Modulus Operator
  • Fibonacci Numbers
  • Birthday Problem
  • Birthday Theorem
  • Birthday Attack
  • Random Number Generators
  • Classification of Random Number Generators
  • Naor-Reingold and Mersenne Twister Pseudorandom Function
  • Linear Congruential Generator
  • Lehmer Random Number Generator
  • Lagged Fibonacci Generator
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
  • RSA – How it Works
  • RSA Example
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
  • Signing with DSA
  • Elliptic Curve
  • Elliptic Curve Variations
  • Elgamal
  • CrypTool

Applications of Cryptographyong

  • Digital Signatures
  • What is a Digital Certificate?
  • Digital Certificates
  • X.509
  • X.509 Certificates
  • X.509 Certificate Content
  • X.509 Certificate File Extensions
  • Certificate Authority (CA)
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
  • Password Authentication Protocol (PAP)
  • Shiva Password Authentication Protocol (S-PAP)
  • Challenge-Handshake Authentication Protocol (CHAP)
  • Kerberos
  • Components of Kerberos System
  • Pretty Good Privacy (PGP)
  • PGP Certificates
  • Wifi Encryption
  • Wired Equivalent Privacy (WEP)
  • WPA – Wi-Fi Protected Access
  • WPA2
  • SSL
  • TLS
  • Virtual Private Network (VPN)
  • Point-to-Point Tunneling Protocol (PPTP)
  • PPTP VPN
  • Layer 2 Tunneling Protocol VPN
  • Internet Protocol Security VPN
  • SSL/VPN
  • Encrypting Files
  • Backing up the EFS key
  • Restoring the EFS Key
  • Bitlocker
  • Bitlocker: Screenshot
  • Disk Encryption Software: Truecrypt
  • Steganography
  • Steganography Terms
  • Historical Steganography
  • Steganography Details
  • Other Forms of Steganography
  • Steganography Implementations
  • Demonstration
  • Steganalysis
  • Steganalysis – Raw Quick Pair
  • Steganalysis – Chi-Square Analysis
  • Steganalysis – Audio Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
  • NSA Suite A Encryption Algorithms
  • NSA Suite B Encryption Algorithms
  • National Security Agency: Type 1 Algorithms
  • National Security Agency: Type 2 Algorithms
  • National Security Agency: Type 3 Algorithms
  • National Security Agency: Type 4 Algorithms
  • Unbreakable Encryption

Introduction and History of Cryptography

  • What is Cryptography?
  • History
  • Mono-Alphabet Substitution
  • Caesar Cipher
  • Atbash Cipher
  • ROT 13
  • Scytale
  • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
  • Cipher Disk
  • Vigenère Cipher
  • Vigenère Cipher: Example
  • Breaking the Vigenère Cipher
  • Playfair
  • The ADFGVX cipher
  • The Enigma Machine
  • CrypTool

RELATED COURSES

about-us-section-divider