Some of the most recent attacks that have had serious consequences share one thing in common – they all had either none or little effective encryption.
ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others.
The course also covers asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
Download EC-Council Certification Track (pdf)
Students will learn the basics of information theory as it applies to cryptography.
Students will be introduced to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.
Students will master significant concepts such as diffusion, confusion, and Kerkchoff’s principle.
This course is aimed to:
No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.
It is structured in thematic units, each of them presents a part of the theory followed by practical exercises of review and understanding.
The material used is in English and includes theory, practical exercises and complementary information.
Includes an EC-Council certification exam.
A certificate of completion is delivered.
Has a duration of 3 days.
Has a minimum capacity of 5 and a maximum of 25 participants.
The certification exam has the following characteristics:
Number of Questions: 50
Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery: EC-Council Exam Portal
The course has the following topics:
Introduction and History of Cryptography
Symmetric Cryptography & Hashes
Number Theory and Asymmetric Cryptography
Applications of Cryptography
Applications of Cryptograph
Our instructors are certified in different EC Council, Information Security, Cloud Computing and Risk Management disciplines and have an extensive experience in:
The design and implementation of Information Security Management Systems in the private and in the public sector.
The selection, implementation and configuration of tools and controls which support the Information Security management and which are the ones of most standing and acknowledgement in the market.
First and second level audits for Information Security Management Systems.
Teaching various ITSM, ISO, Information Security and Risk Management courses in the academic and professional field.
The participant receives a high quality, didactic material in English developed by EC-Council.