0% found this document useful (0 votes)
151 views9 pages

ECESv2 Brochure 2022

This document discusses the EC-Council Certified Encryption Specialist v2 (ECESv2) certification program. [1] It provides an overview of encryption and its increasing importance for protecting organizations' sensitive data. [2] The ECESv2 program teaches professionals about modern symmetric and asymmetric encryption algorithms like AES and RSA. [3] It aims to give students the skills to effectively deploy and apply encryption technologies.

Uploaded by

Iram Kahkashan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
151 views9 pages

ECESv2 Brochure 2022

This document discusses the EC-Council Certified Encryption Specialist v2 (ECESv2) certification program. [1] It provides an overview of encryption and its increasing importance for protecting organizations' sensitive data. [2] The ECESv2 program teaches professionals about modern symmetric and asymmetric encryption algorithms like AES and RSA. [3] It aims to give students the skills to effectively deploy and apply encryption technologies.

Uploaded by

Iram Kahkashan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

SECURING

CRITICAL DATA
WITH ENCRYPTION
EC-Council Certified
Encryption Specialist v2
INTRODUCING THE ECESV2:
World’s most comprehensive and vendor neutral
Encryption certification program

ABOUT ENCRYPTION
As the size and frequency of data breaches increasing over time, more and more organizations are rapidly
recognizing that encryption is no longer an option. They are busy formulating comprehensive strategy
and shifting their stance towards encryption technologies and rapidly deploying a range of technologies
to defend and protect their sensitive data from internal and external threats. Increasingly, business users
are influencing the adoption of encryption technologies more than IT operations teams.

Adoption of encryption in organizations are increasing at a rapid pace as are the urgency in the
encryption implementation plans. The increasing rate of adoption is due to fast evolving regulations and
necessity to protect sensitive data across enterprise networks, multiple devices and especially the
increasing move to storing data on a cloud.

If you think that there is only one type of encryption – think again!

Encryption considerations differ for technologies namely – database encryption, VoIP encryption, portable
storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption,
network link encryption, web server encryption, tape backup encryption and many more.

EC-Council Certified Encryption Specialist v2


02
ABOUT ECESV2
The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to
the field of cryptography. The participants will learn the foundations of modern symmetric and key
cryptography including the details of algorithms such as Feistel Functions, DES, and AES. ECES provides
necessary skills to perform effective deployment of encryption technologies. It is a comprehensive course
covering various algorithms, the key concepts behind those algorithms, applica

PARTICIPANTS WILL ALSO


OTHER TOPICS INTRODUCED:
BE PROVIDED A PRACTICAL
APPLICATION OF THE FOLLOWING:
Overview of other algorithms such as
Blowfish, Twofish, and Skipjack Hands on experience in cryptographic
algorithms ranging from classic ciphers like
Hashing algorithms including MD5, MD6, SHA, Caesar cipher to modern day algorithms
GOST, RIPMD 256 and others such as AES and RSA

Asymmetric cryptography including How to set up a VPN and encrypt a drive


thorough descriptions of RSA, Elgamal,
Elliptic Curve, Hands-on experience with steganography
and DSA

Significant concepts such as diffusion,


confusion, and Kerkchoff’s principle

I work with decryption tools in my


current position. This class gives a
better understanding of different
algorithms and how to attack the
weaknesses.
- John Minotti
Manager of Professional Services,
AccessData, USA

EC-Council Certified Encryption Specialist v2


03
WHY DO WE NEED ECES?
The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to
the field of cryptography. The participants will learn the foundations of modern symmetric and key
cryptography including the details of algorithms such as Feistel Functions, DES, and AES. ECES provides
necessary skills to perform effective deployment of encryption technologies. It is a comprehensive course
covering various algorithms, the key concepts behind those algorithms, applica

Understanding the Without understanding the


cryptography allows you to cryptography at
make informed choices some depth, people are
limited to only marketing
hype of information
security solutions

A person successfully completing Knowledge of


this course will be able to select cryptanalysis is very
the encryption standard that is beneficial for ethical
most beneficial to their hackers and penetration
organization and understand how testing professionals as
to effectively deploy that most penetration testing
technology courses skip cryptanalysis
completely

The course gave me a basic and at times


advance understanding of cryptography.
I really enjoyed the class. It gave a much
better understanding of what
cryptography entails. The course helps
me to evaluate if an organization’s
security in these areas are up to standard.

- Huey Nguyen
Detective, Arlington Police
Department, USA

EC-Council Certified Encryption Specialist v2


04
WHO IS IT FOR?
Prerequisites
No prior knowledge of cryptography is assumed, and no
mathematical skills beyond basic algebra are required.

TARGET AUDIENCE

Penetration Testers and Computer Forensics Specialists

Cloud Security architects, designers, and developers

Anyone involved in selecting and implementing VPNs or digital certificates, Information Security
Operations

Anyone involved in developing Operating Systems, Cryptography Systems, Blockchain based


solutions, etc.

DURATION CERTIFICATION
The EC-Council Certified Encryption Specialist (ECES) may be taken on
3 days / 20 hours
the last day of training (optional). Students need to pass the
(9:00 AM to 4:00 PM) online exam to receive ECES certification

The course provides a good insight of encryption. As a forensic examiner,


it is not a matter of “If”, but “When” you encounter situations where
knowledge of encryption becomes useful.
- Mike Weaver
Detective, Arlington Police Department, USA

EC-Council Certified Encryption Specialist v2


05
EXAM DETAILS

Exam Title: xam Code:


EC-Council Certified 212-81
Encryption Specialist

Exam Availability:
Duration:
EC-Council Exam
2 Hours
Portal

Test Format: Passing Score:


Multiple Choice 70%

EC-Council Certified Encryption Specialist v2


06
WHAT WILL YOU LEARN?

• Types of encryption standards and their differences

• How to select the best standard for your organization?

• How to enhance your pen-testing knowledge in encryption?

• Correct and incorrect deployment of encryption technologies

• Common mistakes made in implementing encryption technologies

• Best practices when implementing encryption technologies

BENEFITS/TAKEAWAYS
The student will

• Develop skills to protect critical data in organizations with encryption

• Develop a deep understanding of essential cryptography algorithms and their applications

• Make informed decisions about applying encryption technologies

• Save time and cost by avoiding common mistakes in mplementing encryption technologies
effectively

• Develop working knowledge of cryptanalysis

EC-Council Certified Encryption Specialist v2


07
COURSE OUTLINE
Module 01: Introduction and History of • Digital Signature Algorithm
Cryptography • Elliptic Curve
• Elgamal
• What is Cryptography?
• CrypTool
• History of Cryptography
• Mono-Alphabet Substitution (Caesar Module 04: Applications of Cryptography
Cipher, Atbash Cipher, Affine Cipher, ROT13
• FIPS Standards
Cipher)
• Digital Signatures
• Multi-Alphabet Substitution (Cipher Disk,
• Digital Certificate
Vigenère Cipher, Playfair Cipher, ADFGVX
• Public Key Infrastructure (PKI)
Cipher)
• Digital Certificate Management
• Homophonic Substitution
• Trust Models
• Null and Book Ciphers
• Certificates and Web Servers
• Rail Fence Ciphers
• Authentication (PAP, S-PAP, CHAP, Kerberos)
• The Enigma Machine
• Pretty Good Privacy (PGP)
• CrypTool
• Wi-Fi Encryption
Module 02: Symmetric Cryptography • SSL and TLS
and Hashes • Virtual Private Network (VPN)
• Encrypting Files
• Symmetric Cryptography
• BitLocker
• Information Theory
• Disk Encryption Software: VeraCrypt
• Kerckhoffs’s Principle
• Common Cryptography Mistakes
• Substitution and Transposition
• Steganography
• Binary Math
• Steganalysis
• Block Cipher vs. Stream Cipher
• Steganography Detection Tools
• Symmetric Block Cipher Algorithms (Feistel
• National Security Agency and Cryptography
Function, DES, 3DES, AES, Blowfish, Serpent,
• Unbreakable Encryption
Twofish, Skipjack, IDEA, CAST, TEA, SHARK)
• Symmetric Algorithm Methods Module 05: Cryptanalysis
• Symmetric Stream Ciphers (RC4, FISH, PIKE)
• Breaking Ciphers
• Hash Function (Hash – Salt, MD5, MD6, SHA,
• Cryptanalysis
FORK-256, RIPEMD-160, GOST, Tiger)
• Frequency Analysis
• CryptoBench
• Kasiski
Module 03: Number Theory and • Cracking Modern Cryptography
Asymmetric Cryptography • Linear Cryptanalysis
• Differential Cryptanalysis
• Asymmetric Encryption
• Integral Cryptanalysis
• Basic Number Facts
• Cryptanalysis Resources
• Birthday Theorem
• Cryptanalysis Success
• Random Number Generator
• Rainbow Tables
• Diffie-Hellman
• Password Cracking
• Rivest Shamir Adleman (RSA)
• Menezes–Qu–Vanstone

EC-Council Certified Encryption Specialist v2


08
www.eccouncil.org

You might also like