Vous êtes sur la page 1sur 6

1

EC-Council

EC-Council
Certified Encryption Specialist

TM
TM

E CCEESS
EC-Council
EC-Council
Certified Encryption
Certified Encryption
Specialist
Specialist
Make YourCertified
EC-Council Encryption WorkSpecialist
Encryption for you
01

About this course


If you think that there is only one type of encryption
– think again!

Secure organizations employ multiple levels of


encryption – database encryption, VoIP encryption,
portable storage encryption, mobile devices
encryption, Wi-Fi encryption, e-mail encryption,
file encryption – server/desktop, network link
encryption, web server encryption, tape backup
encryption and many more.

Some of the most recent attacks that have had


serious consequences share one thing in common –
they all had either none or little effective encryption.
This resulted in thousands of users being affected
and hundreds of millions in losses. It resulted
in serious decline of brand value and public
embarrassment.

To name a few – SONY PS3, RSA, iPhone, LinkedIn

Prerequisites
No prior knowledge of cryptography is assumed,
and no mathematical skills beyond basic algebra are
required.

“I work with decryption tools in my current


position. This class gives a better understanding
Duration
of different algorithms and how to attack the 3 days / 20 hours
weaknesses.”

- John Minotti Certification


Manager of Professional Services,
AccessData The ECES 212-81 exam will be conducted on the
USA last day of training (optional). Students need to
pass the online Prometric exam to receive the ECES
certification.

TM

E CES
EC-Council Certified Encryption Specialist
EC-Council Certified Encryption Specialist
02
Exam Details Course Description
1. Number of Questions: 50
2. Passing Score: 70% • ECES course introduces students to modern
symmetric key cryptography including the
3. Test Duration: 2 Hours details of algorithms such as Feistel Networks,
4. Test Format: Multiple Choice DES, and AES as well as an overview of many
5. Test Delivery: EC-Council Exam Portal other algorithms such as Blowfish, Twofish,
(ECCEXAM) Skipjack, and others
• Students will learn the basics of information
theory as it applies to cryptography
Target Audience • Students will be introduced to hashing
Penetration Testers, Computer Forensics Specialists, algorithms including MD5, MD6, SHA, Gost,
Anyone involved in selecting, implementing VPN’s or RIPMD 256 and others
digital certificates, Anyone involved in information
security operations • The course also covers asymmetric
cryptography including thorough descriptions
of RSA, Elgamal, Elliptic Curve, and DSA
• Students will master significant concepts
such as diffusion, confusion, and Kerkchoff’s
principle

“The course gave me


a basic and at times
advance understanding
of cryptography. I really
enjoyed the class

It gave a much better


understanding of what
cryptography entails.
The course helps
me to evaluate if an
organization’s security
in these areas are up to
standard.”

- Huey Nguyen
Detective, Arlington Police
Department
USA

TM

E CES
EC-Council Certified Encryption Specialist
EC-Council Certified Encryption Specialist
03

“The course provides a good insight of encryption.


What will you learn?
As a forensic examiner, it is not a matter of “If”,
but “When” you encounter situations where • Types of Encryption Standards and their
knowledge of encryption becomes useful.” differences.

- Mike Weaver • How to select the best standard for your


Detective, Arlington Police Department organization.
USA
• How to enhance your pen - testing
knowledge in encryption.

• Correct and incorrect deployment of


encryption technologies.

• Common mistakes made in implementing


encryption technologies.

• Best practices when implementing


encryption technologies.

Course Outline
Module 01: Introduction and History of
Cryptography

Module 02: Symmetric Cryptography & Hashes

Module 03: Number Theory and Asymmetric


Cryptography

Module 04: Applications of Cryptography

Module 05: Applications of Cryptography

TM

E CES
EC-Council Certified Encryption Specialist
EC-Council Certified Encryption Specialist
04

About EC-Council
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization
that certifies individuals in various e-business and security skills. EC Council is the owner and developer
of the world-famous E-Council Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator
(C|HFI), Certified Security Analyst (ECSA), License Penetration Tester (LPT) programs, and various others
offered in over 60 countries around the globe. These certifications are recognized worldwide and have
received endorsements from various government agencies including the US Federal Government via
the Montgomery GI Bill, and the US Government National Security Agency (NSA) and the Committee on
National Security Systems (CNSS) certifying EC-Council’s Certified Ethical Hacking (CEH), Network Security
Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional
(EDRP), Certified Security Analyst (E|CSA) and Licensed Penetration Tester (LPT) program for meeting the
4011, 4012, 4013A, 4014, 4015 and 4016 training standards for information security professionals and most
recently EC-Council has received accreditation from the American National Standards Institute (ANSI).

For more information about EC-Council, please visit http://www.eccouncil.org

“I greatly enjoyed the ECES. It was


challenging and also fun to learn about
cryptography.

It will assist my office in providing


assistance to the district attorney for
investigation into white collar crime
cases.”

- Edith M. Santos
Special Investigator, Dallas County District
Attorney’s Office
USA

TM

E CES
EC-Council Certified Encryption Specialist
EC-Council Certified Encryption Specialist
05

TM EC-Council
E CES
EC-Council Certified Encryption Specialist
www.eccouncil.org/eces
EC-Council Certified Encryption Specialist

Vous aimerez peut-être aussi