Certified Encryption Specialist (ECES)

Seminarinformationen

Seminar - Ziel

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES.

Teilnehmer - Zielgruppe

Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. Basic knowledge of cryptanalysis is very beneficial to any penetration testing.

Kurs - Voraussetzungen

None

Seminardauer

  • 3 Tage
  • 09:00 Uhr bis 17:00 Uhr

Schulungsunterlagen

  • nach Absprache

Seminar-Inhalt / Agenda

Module 01: Introduction and History of Cryptography

  • What is Cryptography?
  • History of Cryptography
  • Mono-Alphabet Substitution
  • Multi-Alphabet Substitution
  • Vigenère Cipher: Example
  • Breaking the Vigenère Cipher
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • The Enigma Machine
  • CrypTool

Module 02: Symmetric Cryptography and Hashes

  • Symmetric Cryptography
  • Information Theory
  • Kerckhoffs's Principle
  • Substitution
  • Transposition
  • Binary Math
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
  • The Feistel Function
  • Unbalanced Feistel Cipher
  • DESx
  • Whitening
  • AES General Overview
  • AES Specifics
  • Symmetric Algorithm Methods
  • Symmetric Stream Ciphers
  • Hash Function
  • The MD5 Algorithm
  • CryptoBench

Module 03: Number Theory and Asymmetric Cryptography

  • Asymmetric Encryption
  • Basic Number Facts
  • Birthday Theorem
  • Birthday Paradox: Probability
  • Random Number Generator
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
  • Elliptic Curve
  • Elgamal
  • CrypTool

Module 04: Applications of Cryptography

  • FIPS Standards
  • Digital Signatures
  • What is a Digital Certificate?
  • X.509
  • X.509 Certificates
  • X.509 Certificate Content
  • X.509 Certificate File Extensions
  • Certificate Authority (CA)
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
  • Components of Kerberos System
  • Kerberos Authentication Process
  • Pretty Good Privacy (PGP)
  • Wi-Fi Encryption
  • SSL
  • TLS
  • Virtual Private Network (VPN)
  • PPTP VPN
  • Encrypting Files
  • BitLocker
  • Disk Encryption Software: VeraCrypt
  • Common Cryptography Mistakes
  • Steganography
  • Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
  • Unbreakable Encryption

Module 05: Cryptanalysis

  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools

Weitere Schulungen zu Thema EC-Council

Certified Incident Handler (ECIH)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

This latest iteration of EC-Council’s Certified Incident Handler (E|CIH) program has been designed and developed in collaboration with cybersecurity and incident handling and response practitioners across the globe. It is a comprehensive specialist-level program that imparts ...

Certified Network Defender (CND)

- u.a. in Nürnberg, Berlin, Stuttgart, München, Köln

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task analysis presented by the ...

Certified Threat Intelligence Analyst (CTIA)

- u.a. in Bremen, Dresden, Essen, Mannheim, Darmstadt

Certified Threat Intelligence Analyst (C|TIA) is designed and developed in collaboration with cybersecurity and threat intelligence experts across the globe to help organizations identify and mitigate business risks by converting unknown internal and external threats into known ...

Disaster Recovery Professional (EDRP)

- u.a. in Berlin, Frankfurt am Main, München, Mannheim, Freiburg

EC Council Disaster Recovery Professional (EDRP) is a compressive professional course that teaches students how to develop enterprise-wide business continuity and disaster recovery plans. It teaches professionals various methods of identifying vulnerabilities and taking ...