Certified Encryption Specialist | E-learning

E-learning (Self-Paced):800€ + IVA

Duração icon

Duração:

12 meses

Próxima Data icon

Próxima Data:

Consulte-nos

Local icon

Local:

Descrição

EC-Council's Certified Encryption Specialist (EICES) program is designed to introduce professionals and students to the intricate field of cryptography. Covering a broad spectrum of topics, the EICES program delves into modern symmetric key cryptography, offering detailed insights into Feistel Networks, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) algorithms. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more. The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on Rivest-Shamir- Adleman (RSA), Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

This course includes:

  • Instructor-led, streaming video training modules- 1 year access
  • Official EC-Council e-courseware 1 year access iLabs, virtual lab platform – 6 months access
  • Certificate of Attendance
  • Certification Exam Voucher

More Details:

  • Access keys must be redeemed within 12 months of purchase
  • This is single user license and may not be shared
  • The duration of EC-Council e-learning courses is 12 months, but pay attention you only have access to ILabs for 6 months.
  • We recommend completing them in 3 months for better results.

Destinatários

  • Penetration Testers and Computer Forensics Specialists
  • Cloud security architects, designers, and developers
  • Anyone involved in selecting and implementing VPNs or digital certificates, information security operations.
  • Anyone involved in developing operating systems, cryptography systems, blockchain-based solutions, etc.
  • Área: EC-Council

  • Certificação Associada: E|CES EXAM

Quero inscrever-me

Programa:

Module 1: Introduction and History of Cryptography

Lessons:

  • Gaps in Crypto Knowledge
  • What is Cryptography?
  • History of Cryptography
  • Mono-Alphabet Substitution
  • Multi-Alphabet Substitution
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • Vernam Cipher
  • The Enigma Machine
  • CrypTool

Module 2: Symmetric Cryptography & Hashes

Lessons:

  • Symmetric Cryptography
  • Information Theory
  • Kerckhoffs’s Principle
  • Substitution
  • Transposition
  • Binary Math
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
  • Symmetric Algorithm Methods
  • Symmetric Stream Ciphers
  • Hash Function
  • CryptoBench

Module 3: Number Theory and Asymmetric Cryptography

Lessons:

  • Asymmetric Encryption
  • Basic Number Facts
  • Birthday Theorem
  • Random Number Generator
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
  • Elliptic Curve
  • Elgamal
  • Cramer – Shoup
  • YAK
  • Forward Secrecy
  • CrypTool

Module 4: Applications of Cryptography

Lessons:

  • FIPS Standards
  • Digital Signatures
  • What is a Digital Certificate?
  • Certificate Authority (CA)
  • Registration Authority (RA)
  • Certificate Authority – Verisign
  • Certificate Types
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
  • PGP Certificates
  • Wi-Fi Encryption
  • SSL
  • TLS
  • Diagram
  • Protocols
  • Common SSL/TLS Libraries
  • Virtual Private Network (VPN)
  • Split Tunneling
  • VPN Modes
  • Encrypting Files
  • BitLocker
  • Disk Encryption Software: VeraCrypt
  • Common Cryptography Mistakes
  • Steganography
  • Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
  • Unbreakable Encryption
  • Blockchain

Module 5: Cryptanalysis

Lessons:

  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools

Module 6: Quantum Computing and Cryptography

Lessons:

  • Quantum Computing and Cryptography
  • Timeline
  • Issues for QC
  • Two Branches
  • NIST
  • Major Approaches
  • Lattice-Based Crypto
  • Learning with Errors
  • GGH
  • NTRU
  • Overview

Pré-requisitos:

No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.

Quero inscrever-me

Partilha: