making IT better!
MENU

Certified Encryption Specialist

Contact Us

Some of the most recent attacks that have had serious consequences share one thing in common – they all had either none or little effective encryption.

ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others.

The course also covers asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA. 

Download EC-Council Certification Track (pdf)

Objectives

Students will learn the basics of information theory as it applies to cryptography.

Students will be introduced to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.

Students will master significant concepts such as diffusion, confusion, and Kerkchoff’s principle. 

Audience

This course is aimed to:

  • Penetration Testers
  • Computer Forensics Specialists
  • Anyone involved in selecting or implementing VPN’s or digital certificates 
  • Anyone involved in information security operations 

Prerequisites

No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required. 

Characteristics:

  • It is structured in thematic units, each of them presents a part of the theory followed by practical exercises of review and understanding.

  • The material used is in English and includes theory, practical exercises and complementary information.

  • Includes an EC-Council certification exam.

  • A certificate of completion is delivered.

  • Has a duration of 3 days.

  • Has a minimum capacity of 5 and a maximum of 25 participants. 

Exam

The certification exam has the following characteristics:

  • Number of Questions: 50

  • Passing Score: 70%

  • Test Duration: 2 Hours

  • Test Format: Multiple Choice

  • Test Delivery: EC-Council Exam Portal 

Topics

The course has the following topics:

  1. Introduction and History of Cryptography

  2. Symmetric Cryptography & Hashes

  3. Number Theory and Asymmetric Cryptography

  4. Applications of Cryptography

  5. Applications of Cryptograph 

Advantages offered by Global Lynx

Our instructors are certified in different EC Council, Information Security, Cloud Computing and Risk Management disciplines and have an extensive experience in: 

  • The design and implementation of Information Security Management Systems in the private and in the public sector.

  • The selection, implementation and configuration of tools and controls which support the Information Security management and which are the ones of most standing and acknowledgement in the market.

  • First and second level audits for Information Security Management Systems.

  • Teaching various ITSM, ISO, Information Security and Risk Management courses in the academic and professional field. 

The participant receives a high quality, didactic material in English developed by EC-Council. 


Contact us