Description

Overview

This course will teach students about information systems risk. Topics covered include risk identification, assessment, evaluation, response, and monitoring, as well as information systems control design and implementation.

Series Taught By: John Glover

Available CEUs for Course Series Completion: 6
Students can earn up to 6 CEUs for fully completing this course series. This information will be displayed on the certificate of completion. Learn More

Course Details

  • 13:59:00 Hours
  • 12 Months Access
  • Presented by highly qualified, industry leading experts

About this Course

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES.

Many penetration testing professionals testing usually don’t attempt to crack cryptography. A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

Objectives

  • Types of Encryption Standards and their differences
  • How to select the best standard for your organization
  • How to enhance your pen-testing knowledge in encryption
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies

Audience

  • Penetration Testers
  • Ethical Hackers
  • Vulnerability Assessment Auditors
  • Risk Assessment Administrators
  • Network Administrators
  • Application Security Engineers
  • Cyber Forensic Investigators/ Analyst and SOC Analyst
  • System Administrators/Engineers
  • Firewall Administrators and Network Managers/IT Managers

Prerequisites

  • Basic IP addressing knowledge.
  • Basic PC operating system navigation skills.
  • Basic internet usage skills.
  • Basic computer literacy.

Course Outline

INTRODUCTION AND HISTORY OF CRYPTOGRAPHY

  • Overview
  • History Of Cryptography
  • History Of Cryptography Part 2
  • History Of Cryptography Part 3
  • Crypto Definitions
  • Crypto Definitions Part 2
  • Crypto Definitions Part 3

SYMMETRIC CRYPTOGRAPHY & HASHES

  • Symmetric Cryptography And Hashes
  • Symmetric Cryptography And Hashes Part 2
  • Symmetric Cryptography And Hashes Part 3
  • Symmetric Cryptography And Hashes Part 4
  • Symmetric Cryptography And Hashes Part 5
  • Symmetric Cryptography And Hashes Part 6
  • Symmetric Cryptography And Hashes Part 7

NUMBER THEORY AND ASYMMETRIC CRYPTOGRAPHY

  • Asymmetric Cryptography
  • Asymmetric Cryptography Part 2
  • Asymmetric Cryptography Part 3

APPLICATIONS OF CRYPTOGRAPHY

  • Applications Of Cryptography
  • Applications Of Cryptography Part 2
  • Applications Of Cryptography Part 3
  • Applications Of Cryptography Part 4
  • Applications Of Cryptography Part 5
  • Applications Of Cryptography Part 6
  • Cryptanalysis
  • Cryptanalysis Part 2