EC-Council - Certified Encryption Specialist (ECES)

Duration

Duration:

Only 2 Days

Method

Method:

Classroom / Online / Hybrid

Next date

Next date:

28/6/2021 (Monday)

Benefits

Benefits of Training with Firebrand

  • Two options of training - Residential classroom-based, or online courses
  • A purpose-built training centre – get access to dedicated Pearson VUE Select facilities
  • Certification Guarantee – pass first time or train again free (just pay for accommodation, exams and incidental costs)
  • Everything you need to certify – you’ll sit your exam at the earliest available opportunity after the course - either immediately after your classroom course, or as soon as there are slots available, if you've taken it online
  • No hidden extras – one cost covers everything you need to certify

Seven reasons why you should sit your course with Firebrand Training

  1. Two options of training. Choose between residential classroom-based, or online ECES courses
  2. You'll be ECES certified in just 2 days. With us, you’ll be ECES trained in record time
  3. Our ECES course is all-inclusive. A one-off fee covers all course materials, exams, accommodation and meals. No hidden extras
  4. Pass ECES first time or train again for free. This is our guarantee. We’re confident you’ll pass your course first time. But if not, come back within a year and only pay for accommodation, exams and incidental costs
  5. You’ll learn more. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  6. You’ll learn ECES faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  7. You’ll be studying ECES with the best. We’ve been named in Training Industry’s “Top 20 IT Training Companies of the Year” every year since 2010. As well as winning many more awards, we’ve trained and certified 102635 professionals, and we’re partners with all of the big names in the business

Curriculum

1. Introduction and History of Cryptography

  • What is Cryptography?
  • History
  • Mono-Alphabet Substitution
    • Caesar Cipher
    • Atbash Cipher
    • ROT 13
    • Scytale
    • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
    • Cipher Disk
    • Vigenère Cipher
      • Vigenère Cipher: Example
      • Breaking the Vigenère Cipher
    • Playfair
    • The ADFGVX cipher
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • The Enigma Machine
  • CrypTool

2. Symmetric Cryptography & Hashes

  • Symmetric Cryptography
  • Information Theory
    • Information Theory Cryptography Concepts
  • Kerckhoffs's Principle
  • Substitution
  • Transposition
  • Substitution and Transposition
  • Binary Math
    • Binary AND
    • Binary OR
    • Binary XOR
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
    • Basic Facts of the Feistel Function
      • The Feistel Function
      • Unbalanced Feistel Cipher
    • Data Encryption Standard (DES)
    • 3DES
      • DESx
      • Whitening
    • Advanced Encryption Standard (AES)
      • AES General Overview
      • AES Specifics
    • Blowfish
    • Serpent
    • Twofish
    • Skipjack
    • International Data Encryption Algorithm (IDEA)
    • CAST
    • Tiny Encryption Algorithm (TEA)
    • SHARK
  • Symmetric Algorithm Methods
    • Electronic Codebook (ECB)
    • Cipher-Block Chaining (CBC)
    • Propagating Cipher-Block Chaining (PCBC)
    • Cipher Feedback (CFB)
    • Output Feedback (OFB)
    • Counter (CTR)
    • Initialisation Vector (IV)
  • Symmetric Stream Ciphers
    • Example of Symmetric Stream Ciphers: RC4
    • Example of Symmetric Stream Ciphers: FISH
    • Example of Symmetric Stream Ciphers: PIKE
  • Hash Function
    • Hash - Salt
    • MD5
      • The MD5 Algorithm
    • MD6
    • Secure Hash Algorithm (SHA)
    • Fork 256
    • RIPEMD – 160
    • GOST
    • Tiger
  • CryptoBench

3 Number Theory and Asymmetric Cryptography

  • Asymmetric Encryption
  • Basic Number Facts
    • Prime Numbers
    • Co-Prime
    • Eulers Totient
    • Modulus Operator
    • Fibonacci Numbers
  • Birthday Theorem
    • Birthday Paradox
      • Birthday Paradox: Probability
    • Birthday Attack
  • Random Number Generators
    • Classification of Random Number Generators
    • Traits of a Good PRNG
    • Naor-Reingold and Mersenne Twister Pseudorandom Function
    • Linear Congruential Generator
    • Lehmer Random Number Generator
    • Lagged Fibonacci Generator (LFG)
    • Blum Blum Shub
    • Yarrow
    • Fortuna
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
    • RSA – How it Works
    • RSA Example
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
    • Signing with DSA
  • Elliptic Curve
    • Elliptic Curve Variations
  • Elgamal
  • CrypTool

4 Applications of Cryptography

  • Digital Signatures
  • What is a Digital Certificate?
    • Digital Certificates
      • X.509
      • X.509 Certificates
      • X.509 Certificate Content
      • X.509 Certificate File Extensions
  • Certificate Authority (CA)
    • Certificate Authority - Verisign
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
    • Password Authentication Protocol (PAP)
    • Shiva Password Authentication Protocol (S-PAP)
    • Challenge-Handshake Authentication Protocol (CHAP)
    • Kerberos
      • Components of Kerberos System
      • Kerberos Authentication Process
  • Pretty Good Privacy (PGP)
    • PGP Certificates
  • Wifi Encryption
    • Wired Equivalent Privacy (WEP)
    • WPA - Wi-Fi Protected Access
    • WPA2
  • SSL
  • TLS
  • Virtual Private Network (VPN)
    • Point-to-Point Tunneling Protocol (PPTP)
      • PPTP VPN
    • Layer 2 Tunneling Protocol VPN
    • Internet Protocol Security VPN
    • SSL/VPN
  • Encrypting Files
    • Backing up the EFS key
    • Restoring the EFS Key
  • Bitlocker
    • Bitlocker: Screenshot
  • Disk Encryption Software: VeraCrypt
  • Steganography
    • Steganography Terms
    • Historical Steganography
    • Steganography Details
    • Other Forms of Steganography
    • How to Embed?
    • Steganographic File Systems
    • Steganography Implementations
    • Demonstration
  • Steganalysis
    • Steganalysis – Raw Quick Pair
    • Steganalysis - Chi-Square Analysis
    • Steganalysis - Audio Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
    • NSA Suite A Encryption Algorithms
    • NSA Suite B Encryption Algorithms
    • National Security Agency: Type 1 Algorithms
    • National Security Agency: Type 2 Algorithms
    • National Security Agency: Type 3 Algorithms
    • National Security Agency: Type 4 Algorithms
  • Unbreakable Encryption

5. Cryptanalysis

  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
    • Cracking Modern Cryptography: Chosen Plaintext Attack
    • Cracking Modern Cryptography: Ciphertext-only and Related-key Attack
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools

Exam Track

You'll sit the following exam at the Firebrand Training Centre, covered by your Certification Guarantee:

ECES exam code 212-81

Exam Details:

  • Number of Questions: 50
  • Passing Score: 70%
  • Test Duration: 2 Hours
  • Test Format: Multiple Choice

What's Included

Your accelerated course includes:

  • Accommodation *
  • Meals, unlimited snacks, beverages, tea and coffee *
  • On-site exams **
  • Exam vouchers **
  • Practice tests **
  • Certification Guarantee ***
  • Courseware
  • Up-to 12 hours of instructor-led training each day
  • 24-hour lab access
  • Digital courseware **
  • * For residential training only. Doesn't apply for online courses
  • ** Some exceptions apply. Please refer to the Exam Track or speak with our experts
  • *** Pass first time or train again free (just pay for accommodation, exams and incidental costs)

Prerequisites

You do not need to possess any prerequisites for this certification.

Unsure whether you meet the prerequisites? Don’t worry. Your training consultant will discuss your background with you to understand if this course is right for you.

Reviews

Here's the Firebrand Training review section. Since 2001 we've trained exactly 102635 students and asked them all to review our Accelerated Learning. Currently, 96.68% have said Firebrand exceeded their expectations.

Read reviews from recent accelerated courses below or visit Firebrand Stories for written and video interviews from our alumni.


"Firebrand has been an excellent experience that has bolstered my knowledge of security greatly. The course volume and length of the days are quite the undertaking but the teaching style makes it work with an excellent pay off from sticking through it."
D.B.. (2/4/2021 (Friday) to 6/4/2021 (Tuesday))

"The material has been presented professionaly. Breaks has been given quite regularly. The instructor has been very helpful"
Nikolina Ilcheva, NIKOLINA ILCHEVA. (2/4/2021 (Friday) to 6/4/2021 (Tuesday))

"Wow! What an amazing course. I have gained a massive amount of knowledge over the last 5 days. And the tutor made it more interesting than I even imagined :- I would recommend this training to anyone who wants to get immersed in the world of Ethical Hacking. Thank you"
Daniel Cieslar. (1/2/2021 (Monday) to 5/2/2021 (Friday))

"Experience from the outset was excellent. I was advised on the best course of action which really helped me decide the most appropriate course. The instructor delivered the course SUPERBLY. Wow! What a body of knowledge he possesses. First class experience and i can highly recommend this course!!"
Alan Gardner, Darkskope Corporation. (8/2/2021 (Monday) to 10/2/2021 (Wednesday))

"At first hesitant to try online training as I prefer the face to face and interaction. Found it was really good and managed very well."
Shane Lewis, Semafone Limited. (8/2/2021 (Monday) to 10/2/2021 (Wednesday))

Course Dates

Start

Finish

Status

Location

Book now

22/2/2021 (Monday)

23/2/2021 (Tuesday)

Finished - Leave feedback

-

 

28/6/2021 (Monday)

29/6/2021 (Tuesday)

Wait list

Nationwide

 

9/8/2021 (Monday)

10/8/2021 (Tuesday)

Limited availability

Nationwide

 

20/9/2021 (Monday)

21/9/2021 (Tuesday)

Open

Nationwide

 

1/11/2021 (Monday)

2/11/2021 (Tuesday)

Open

Nationwide

 

13/12/2021 (Monday)

14/12/2021 (Tuesday)

Open

Nationwide

 

Latest Reviews from our students