It Includes
- 5 Days training program
- Live Virtual Training
- Learn on any PC/Mobile/Tablet
- Unlimited Doubt Sessions
- Online Labs (if applicable)
- Official Courseware & Kits
- Get Recording after session
- Get Certificate of Completion
- Mock Tests & Exam Preps
- Classroom Training (Optional)
Training 2 or more people?
Get a custom quote for group training, Onsite & classroom options.
Request a QuoteCourse Overview
COURSE OBJECTIVE
The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:
- Overview of other algorithms such as Blowfish, Twofish, and Skipjack
- Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
- Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
- Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.
Participants will also be provided a practical application of the following:
- How to set up a VPN
- Encrypt a drive
- Hands-on experience with steganography
- Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.
Who Should Attend?
Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.
This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. A basic knowledge of cryptanalysis is very beneficial to any penetration testing.
Course Outline
-
Introduction and History of Cryptography
- What is Cryptography?
- History
- Mono-Alphabet Substitution
- Caesar Cipher
- Atbash Cipher
- ROT 13
- Scytale
- Single Substitution Weaknesses
- Multi-Alphabet Substitution
- Cipher Disk
- Vigenère Cipher
- Vigenère Cipher: Example
- Breaking the Vigenère Cipher
- Playfair
- The ADFGVX cipher
- The Enigma Machine
- CrypTool
-
Symmetric Cryptography & Hashes
- Symmetric Cryptography
- Information Theory
- Information Theory Cryptography Concepts
- Kerckhoffs's Principle
- Substitution
- Transposition
- Substitution and Transposition
- Binary M
- ath
- Binary AND
- Binary OR
- Binary XOR
- Block Cipher vs. Stream Cipher
- Symmetric Block Cipher Algorithms
- Basic Facts of the Feistel Function
- The Feistel Function
- A Simple View of a Single Round
- Unbalanced Feistel Cipher
- DES
- 3DES
- DESx
- Whitening
- AES
- AES General Overview
- AES Specifics
- Blowfish
- Serpent
- Twofish
- Skipjack
- IDEA
- Symmetric Algorithm Methods
- Electronic Codebook (ECB)
- Cipher-Block Chaining (CBC)
- Propagating Cipher-Block Chaining (PCBC)
- Cipher Feedback (CFB)
- Output Feedback (OFB)
- Counter (CTR)
- Initialisation Vector (IV)
- Symmetric Stream Ciphers
- Example of Symmetric Stream Ciphers: RC4
- Example of Symmetric StreamCiphers: FISH
- Example of Symmetric Stream Ciphers: PIKE
- Hash
- Hash – Salt
- MD5
- The MD5 Algorithm
- MD6
- Secure Hash Algorithm (SHA)
- Fork 256
- RIPEMD– 160
- GOST
- Tiger
- CryptoBench
-
Number Theory and Asymmetric Cryptography
- Asymmetric Encryption
- Basic Number Facts
- Prime Numbers
- Co-Prime
- Eulers Totient
- Modulus Operator
- Fibonacci Numbers
- Birthday Problem
- Birthday Theorem
- Birthday Attack
- Random Number Generators
- Classification of Random Number Generators
- Naor-Reingold and Mersenne TwisterPseudorandom Function
- Linear Congruential Generator
- Lehmer Random Number Generator
- Lagged Fibonacci Generator
- Diffie-Hellman
- Rivest Shamir Adleman (RSA)
- RSA – How it Works
- RSA Example
- Menezes–Qu–Vanstone
- Digital Signature Algorithm
- Signing with DSA
- Elliptic Curve
- Elliptic Curve Variations
- Elgamal
- CrypTool
-
Applications of Cryptography
- Digital Signatures
- What is a Digital Certificate?
- Digital Certificates
- X.509
- X.509 Certificates
- X.509 Certificate Content
- X.509 Certificate File Extensions
- Certificate Authority (CA)
- Registration Authority (RA)
- Public Key Infrastructure (PKI)
- Digital Certificate Terminology
- Server-based Certificate Validation Protocol
- Digital Certificate Management
- Trust Models
- Certificates and Web Servers
- Microsoft Certificate Services
- Windows Certificates: certmgr.msc
- Authentication
- Password Authentication Protocol (PAP)
- Shiva Password Authentication Protocol (S-PAP)
- Challenge-Handshake Authentication Protocol (CHAP)
- Kerberos
- Components of Kerberos System
- Pretty Good Privacy (PGP)
- PGP Certificates
- Wifi Encryption
- Wired Equivalent Privacy (WEP)
- WPA - Wi-Fi Protected Access
- WPA2
- SSL
- TLS
- Virtual Private Network (VPN)
- Point-to-Point Tunneling Protocol (PPTP)
- PPTP VPN
- Layer 2 Tunneling Protocol VPN
- Internet Protocol Security VPN
- SSL/VPN
- Encrypting Files
- Backing up the EFS key
- Restoring the EFS Key
- Bitlocker
- Bitlocker: Screenshot
- Disk Encryption Software: Truecrypt
- Steganography
- Steganography Terms
- Historical Steganography
- Steganography Details
- Other Forms of Steganography
- Steganography Implementations
- Demonstration
- Steganalysis
- Steganalysis – Raw Quick Pair
- Steganalysis - Chi-Square Analysis
- Steganalysis - Audio Steganalysis
- Steganography Detection Tools
- National Security Agency and Cryptography
- NSA Suite A Encryption Algorithms
- NSA Suite B Encryption Algorithms
- National Security Agency: Type 1 Algorithms
- National Security Agency: Type 2 Algorithms
- National Security Agency: Type 3 Algorithms
- National Security Agency: Type 4 Algorithms
- Unbreakable Encryption
-
Applications of Cryptography
- Breaking Ciphers
- Cryptanalysis
- Frequency Analysis
- Kasiski
- Cracking Modern Cryptography
- Cracking Modern Cryptography: Chosen Plaintext Attack
- Linear Cryptanalysis
- Differential Cryptanalysis
- Integral Cryptanalysis
- Cryptanalysis Resources
- Cryptanalysis Success
- Rainbow Tables
- Password Cracking
- Tools
Vendor
Frequently Asked Questions
-
How does Live Training works?
Live training, also known as online training, is a method of delivering training in real-time over the internet. The trainer and the trainees are connected through video conferencing software, allowing for interactive communication and collaboration. During live training, the trainer can present materials, lead discussions, answer questions, and engage with the trainees in real-time. -
Does Learnfly offer Classroom & Onsite training as well?
Yes. We Do! We do offer classroom, onsite, group sessions & 1 on 1 training for selective courses. Contact our support team and our team will assist you with the process. -
Do you provide certification and exam assistance?
Yes! We provide assistance in scheduling & preparing for your exam after a successful training completion. Once you successfully pass your exam, you will be awarded with a certification. -
What if I miss my scheduled class or want to reschedule?
No worries. You can simply request for the next date as per your availability. -
Can I change the trainer if not satisfied?
We only provide highly qualified and certified trainers with 100% satisfaction rate. However, if you are not satisfied with the trainer, you can request for a free replacement. -
Do I get a lab access with the course?
Yes! If your training require a lab access, then it will be included in the price. -
Is Learnfly accredited?
Yes! Learnfly is accredited with many renowned vendors like Microsoft, ISACA, VMWare, PECB, EC Council. Cisco and many more. -
Are Learnfly Instructor's Certified?
Yes. We only provide training via Certified Instructors. -
Where is Learnfly Located?
Learnfly is a global training provider with locations in India, United States, United Kingdom, UAE, Australia & Africa. -
Does Learnfly offer after training support?
Yes. We offer 1 month free support after your training completion for any queries related to your course, examination etc. -
What is Learnfly Platform?
Learnfly Platform is an omnnichannel Learning Management System that allows you to access thousands of self paced courses, attend live classes, track certifications, access interactive quizzes & assignments, Online labs, connect with Instructors & do much more. Join the platform to know more. -
Do you offer a demo live session with an instructor?
Yes! If you need a demo session to get a feel of live training or to evaluate an instructor, then you can request for a 15 minutes free live session. Connect with our training team for more info. -
Can I get a refund if not satisfied?
All of our training comes with 30 days money back guarantee. Refunds are only applicable on instructor training. Exam, labs are non-refundable. -
How can I make a payment for my training?
We accept all major payment methods like debit/credit card, PayPal and Bank Wire transfer. For bank transfer, please contact us at support@learnfly.com -
How can i get started?
Super! Simply click on "Book Now" button on this page to reserve your seat and make a payment. You can choose from available schedules or provide your own. For anything else like quotation, purchase order, bank wire details etc, please contact our training team at support@learnfly.com. See you learning with us soon!
Certification Partners
Meet our official certification partners. Get Certified with internationally recognised names.
Earn International recognition and certification
Earn International recognition and certification
Get Certified : Get Ahead
Get your own personalized Certificate of Completion, once you successfully complete the training with Learnfly. Showcase your certifcation on Linkedin & more.
250k+ Students and growing.
Listen what they say about Learnfly Courses
I enrolled in ECIH course from Learnfly. This platform enabled me to learn difficult concepts with ease and that too at my own pace. I completed the course in a comfortable environment and would surely recommend Learnfly for this IT course that is well in demand.
Helen Thorogood,
- Student -
I enrolled in Machine Learning course from Learnfly. It was a good learning experience and I learnt the concepts well through the video lectures. The videos were well designed and helped me follow a step-by-step approach to complete my course. I recommend Learnfly for this course.
Elanie Mitchell,
- Student -
I was thrilled to pursue Artificial Intelligence course. It is in high demand. I started searching for a good online platform and luckily found Learnfly. I was initially skeptical about it but later found that it was good. My course was completed in a hassle-free manner. Kudos to Learnfly!
Ailsa Thomas,
- Student -
I pursued CEH from Learnfly. I easily understood the stuff as it was imparted in a fresh manner through well-structured video lectures. All the topics were covered in the videos and I could access them as per my requirements at different points of time. I recommend Learnfly platform to save both your time and money.
Pulkit Reddy,
- Student -
There is high demand for Artificial Intelligence course in the job market these days. I chose Learnfly to pursue this course. The video lectures were designed in a learner-friendly way and it was really convenient for me to understand the concepts well in a short span of time invested.
Raghavendran Burman,
- Student -
Machine Learning is a course that is in demand these days. I was not interested to pursue it through classroom lecture mode. I searched for few platforms offering this course online but finally opted for Learnfly. It trained me for the technology and I am now able to gain a better position in my company after learning at my own and attaining the certificate.