Menu
EUR
Nu 10% korting op alle Microsoft-certificeringen! Bekijk aanbod
EC-Council Certified Encryption Specialist (ECES) Training
€1.184,59 €979,00
In shopping cart
EC-Council Certified Encryption Specialist (ECES) Training
EC-Council
(0)
EC-Council Certified Encryption Specialist (ECES) Training
EC-Council Certified Encryption Specialist (ECES) Training
EC-Council Certified Encryption Specialist (ECES) Training
EC-Council Certified Encryption Specialist (ECES) Training
EC-Council Certified Encryption Specialist (ECES) Training
EC-Council Certified Encryption Specialist (ECES) Training

EC-Council Certified Encryption Specialist (ECES) Training

€1.184,59 €979,00 Incl. tax Excl. tax
In stock

Certified Encryption Specialist (ECES) is an IT certification that covers the key concepts and techniques of encryption. Read more.

Make a choice
standaardprijs
141723484
In stock
Ordered before 5 p.m.! Start today.
141723484
€1.184,59 €979,00
  • Officieel Certiport Examencentrum
    Online of fysiek in Almere
  • Direct starten met bekroonde e-learning
    Inclusief proefexamens & 24/7 toegang
  • ISO 9001 & 27001 gecertificeerd
    1000+ bedrijven gingen u voor
  • Persoonlijk advies & maatwerk
    Gratis intake & nulmeting bij training

Product description

Certified Encryption Specialist (ECES) Training

Certified Encryption Specialist (ECES) is a professional certification for individuals who want to learn how to secure data and protect networks. The ECES certification is provided by the International Council of E-Commerce Consultants (EC-Council), a leading cybersecurity organization.

The ECES certification provides individuals with the skills and knowledge needed to encrypt data, secure communications and protect data from unauthorized access. This certification covers a wide range of encryption technologies, including symmetric and asymmetric encryption, digital signatures and PKI (Public Key Infrastructure).

ECES-certified professionals have the necessary expertise to apply encryption in various environments, including network infrastructure, Web-based applications and mobile devices. They are also trained in forensic techniques to help recover encrypted data in the event of an attack.

To earn the ECES certification, candidates must complete a comprehensive training program covering the latest encryption technologies and methods. The training is designed for individuals who have some prior knowledge of encryption and want to take their skills to the next level.

Holders of an ECES certificate have several career options in cybersecurity, including roles as security consultants, system administrators and network engineers. They can also work as data security analysts, digital forensics experts and security auditors.

The ECES certification is an excellent choice for individuals who want to gain advanced knowledge of encryption techniques and improve their cybersecurity skills. It is a valuable certificate that demonstrates a high level of expertise and can help individuals advance in their careers.

Course content

1. Introduction and History of Cryptography

  • What is Cryptography?
  • History of Cryptography
  • Mono-Alphabet Substitution
    • Caesar Cipher
    • Atbash Cipher
    • Affine Cipher
    • ROT13 Cipher
    • Scytale
    • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
    • Cipher Disk
    • Vigenère Cipher
      • Vigenère Cipher: Example
      • Breaking the Vigenère Cipher
    • Playfair Cipher
    • ADFGVX Cipher
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • The Enigma Machine
  • CrypTool

2. Symmetric Cryptography & Hashes

  • Symmetric Cryptography
  • Information Theory
    • Information Theory Cryptography Concepts
  • Kerckhoffs’s Principle
  • Substitution
  • Transposition
  • Binary Math
    • Binary AND
    • Binary OR
    • Binary XOR
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
    • Basic Facts of the Feistel Function
      • The Feistel Function
      • Unbalanced Feistel Cipher
    • Data Encryption Standard (DES)
    • 3DES
      • DESx
      • Whitening
    • Advanced Encryption Standard (AES)
      • AES General Overview
      • AES Specifics
    • Blowfish
    • Serpent
    • Twofish
    • Skipjack
    • International Data Encryption Algorithm (IDEA)
    • CAST
    • Tiny Encryption Algorithm (TEA)
    • SHARK
  • Symmetric Algorithm Methods
    • Electronic Codebook (ECB)
    • Cipher-Block Chaining (CBC)
    • Propagating Cipher-Block Chaining (PCBC)
    • Cipher Feedback (CFB)
    • Output Feedback (OFB)
    • Counter (CTR)
    • Initialization Vector (IV)
  • Symmetric Stream Ciphers
    • Example of Symmetric Stream Ciphers: RC4
    • Example of Symmetric Stream Ciphers: FISH
    • Example of Symmetric Stream Ciphers: PIKE
  • Hash Function
    • Hash – Salt
    • MD5
      • The MD5 Algorithm
    • MD6
    • Secure Hash Algorithm (SHA)
    • FORK-256
    • RIPEMD-160
    • GOST
    • Tiger
    • MAC and HMAC
  • CryptoBench

3. Number Theory and Asymmetric Cryptography

  • Asymmetric Encryption
  • Basic Number Facts
    • Prime Numbers
    • Co-Prime Numbers
    • Euler’s Totient
    • Modulus Operator
    • Fibonacci Numbers
  • Birthday Theorem
    • Birthday Paradox
      • Birthday Paradox: Probability
    • Birthday Attack
  • Random Number Generator
    • Classification of Random Number Generator
    • Traits of a Good PRNG
    • Naor-Reingold and Mersenne Twister Pseudorandom Function
    • Linear Congruential Generator
    • Lehmer Random Number Generator
    • Lagged Fibonacci Generator (LFG)
    • Blum Blum Shub
    • Yarrow
    • Fortuna
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
    • RSA – How it Works
    • RSA Example
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
    • Signing with DSA
  • Elliptic Curve
    • Elliptic Curve Variations
  • Elgamal
  • CrypTool

4. Applications of Cryptography

  • FIPS Standards
  • Digital Signatures
  • What is a Digital Certificate?
    • Digital Certificates
      • X.509
      • X.509 Certificates
      • X.509 Certificate Content
      • X.509 Certificate File Extensions
  • Certificate Authority (CA)
    • Certificate Authority – Verisign
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
    • Password Authentication Protocol (PAP)
    • Shiva Password Authentication Protocol (S-PAP)
    • Challenge-Handshake Authentication Protocol (CHAP)
    • Kerberos
      • Components of Kerberos System
      • Kerberos Authentication Process
  • Pretty Good Privacy (PGP)
    • PGP Certificates
  • Wi-Fi Encryption
    • Wired Equivalent Privacy (WEP)
    • WPA – Wi-Fi Protected Access
    • WPA2
  • SSL
  • TLS
  • Virtual Private Network (VPN)
    • Point-to-Point Tunneling Protocol (PPTP)
      • PPTP VPN
    • Layer 2 Tunneling Protocol VPN
    • Internet Protocol Security VPN
    • SSL/TLS VPN
  • Encrypting Files
    • Backing up the EFS key
    • Restoring the EFS Key
  • BitLocker
    • BitLocker: Screenshot
  • Disk Encryption Software: VeraCrypt
  • Common Cryptography Mistakes
  • Steganography
    • Steganography Terms
    • Historical Steganography
    • Steganography Details
    • Other Forms of Steganography
    • How to Embed?
    • Steganographic File Systems
    • Steganography Implementations
    • Demonstration
  • Steganalysis
    • Steganalysis – Raw Quick Pair
    • Steganalysis – Chi-Square Analysis
    • Steganalysis – Audio Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
    • NSA Suite A Encryption Algorithms
    • NSA Suite B Encryption Algorithms
    • National Security Agency: Type 1 Algorithms
    • National Security Agency: Type 2 Algorithms
    • National Security Agency: Type 3 Algorithms
    • National Security Agency: Type 4 Algorithms
  • Unbreakable Encryption

5. Cryptanalysis

  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
    • Cracking Modern Cryptography: Chosen Plaintext Attack
    • Cracking Modern Cryptography: Ciphertext-only and Related-key Attack
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools

Specifications

Article number
141723484
SKU
141723484
Lesson duration
Variable
Language
English
Certificate of participation
Online access
1 year unlimited access
Progress monitoring

Reviews

0/5
0 stars based on 0 reviews
0 reviews
Vragen over deze training?
Of wilt u hulp bij het bestellen? Neem gerust contact op via [email protected] of bel ons op +31 36 760 1019. Wij helpen u graag!

Related IT Training & Courses and More

Vragen over deze training?
Of wilt u hulp bij het bestellen? Neem gerust contact op via [email protected] of bel ons op +31 36 760 1019. Wij helpen u graag!

Recently viewed

EC-Council Certified Encryption Specialist (ECES) Training
EC-Council
Certified Encryption Specialist (ECES) Training
Certified Encryption Specialist (ECES) is an IT certification that covers the ke...
€1.184,59 €979,00
 
ITIL ITIL 4 Foundation Training
ITIL
ITIL 4 Foundation Training
Order this unique E-Learning ITIL 4 Foundation Training online, 1 year 24/7 acce...
€361,79 €299,00
 

Specifications

Article number
141723484
SKU
141723484
Lesson duration
Variable
Language
English
Certificate of participation
Online access
1 year unlimited access
Progress monitoring
0/5
0 stars based on 0 reviews
0 reviews
Choose your language
Choose your currency

Recently added

Total excl. VAT
€0,00
Order for another €50,00 and receive free shipping
0
Compare
Start comparison

Review EC-Council Certified Encryption Specialist (ECES) Training

This product has been added to your cart
Wij gebruiken functionele en analytische cookies om onze website goed te laten werken en het gebruik ervan te meten met Google Analytics. Er worden geen persoonsgegevens gedeeld voor advertentiedoeleinden. Door op "Accepteren" te klikken, geeft u toestemming voor het plaatsen van deze cookies. Manage cookies