ec-council certi ed encryption specialist · administrator (ensa), computer hacking forensics...

6
EC-Council Certified Encryption Specialist Certified S Encryption Specialist TM C E E EC-Council 1 Make Your Encryption Work for you Certified S Encryption Specialist TM C E E EC-Council EC-Council EC-Council Certified Encryption Specialist

Upload: others

Post on 04-Apr-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: EC-Council Certi ed Encryption Specialist · Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

1

Make Your Encryption Work for youCertified

SEncryption Specialist

TM

CE EEC-Council

EC-Council

EC-CouncilCerti�ed Encryption Specialist

Page 2: EC-Council Certi ed Encryption Specialist · Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

01

About this courseIf you think that there is only one type of encryption – think again!

Secure organizations employ multiple levels of encryption – database encryption, VoIP encryption, portable storage encryption, mobile devices encryption, Wi-Fi encryption, e-mail encryption, file encryption – server/desktop, network link encryption, web server encryption, tape backup encryption and many more.

Some of the most recent attacks that have had serious consequences share one thing in common – they all had either none or little effective encryption. This resulted in thousands of users being affected and hundreds of millions in losses. It resulted in serious decline of brand value and public embarrassment.

To name a few – SONY PS3, RSA, iPhone, LinkedIn

PrerequisitesNo prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.

Duration3 days / 20 hours

CertificationThe ECES 212-81 exam will be conducted on the last day of training (optional). Students need to pass the online Prometric exam to receive the ECES certification.

“I work with decryption tools in my current position. This class gives a better understanding of different algorithms and how to attack the weaknesses.”

- John Minotti Manager of Professional Services,

AccessData USA

Page 3: EC-Council Certi ed Encryption Specialist · Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

02

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

Exam Details1. Number of Questions: 50

2. Passing Score: 70%

3. Test Duration: 2 Hours

4. Test Format: Multiple Choice

5. Test Delivery: EC-Council Exam Portal (ECCEXAM)

Target AudiencePenetration Testers, Computer Forensics Specialists, Anyone involved in selecting, implementing VPN’s or digital certificates, Anyone involved in information security operations

Course Description

• ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others

• Students will learn the basics of information theory as it applies to cryptography

• Students will be introduced to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others

• The course also covers asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA

• Students will master significant concepts such as diffusion, confusion, and Kerkchoff’s principle

“The course gave me a basic and at times advance understanding of cryptography. I really enjoyed the class

It gave a much better understanding of what cryptography entails. The course helps me to evaluate if an organization’s security in these areas are up to standard.”

- Huey NguyenDetective, Arlington Police

DepartmentUSA

Page 4: EC-Council Certi ed Encryption Specialist · Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

03

What will you learn?

• Types of Encryption Standards and their differences.

• How to select the best standard for your organization.

• How to enhance your pen - testing knowledge in encryption.

• Correct and incorrect deployment of encryption technologies.

• Common mistakes made in implementing encryption technologies.

• Best practices when implementing encryption technologies.

Course Outline

Module 01: Introduction and History of

Cryptography

Module 02: Symmetric Cryptography & Hashes

Module 03: Number Theory and Asymmetric Cryptography

Module 04: Applications of Cryptography

Module 05: Applications of Cryptography

“The course provides a good insight of encryption. As a forensic examiner, it is not a matter of “If”, but “When” you encounter situations where knowledge of encryption becomes useful.”

- Mike WeaverDetective, Arlington Police Department

USA

Page 5: EC-Council Certi ed Encryption Specialist · Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

04

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

About EC-CouncilThe International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. EC Council is the owner and developer of the world-famous E-Council Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (C|HFI), Certified Security Analyst (ECSA), License Penetration Tester (LPT) programs, and various others offered in over 60 countries around the globe. These certifications are recognized worldwide and have received endorsements from various government agencies including the US Federal Government via the Montgomery GI Bill, and the US Government National Security Agency (NSA) and the Committee on National Security Systems (CNSS) certifying EC-Council’s Certified Ethical Hacking (CEH), Network Security Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst (E|CSA) and Licensed Penetration Tester (LPT) program for meeting the 4011, 4012, 4013A, 4014, 4015 and 4016 training standards for information security professionals and most recently EC-Council has received accreditation from the American National Standards Institute (ANSI).

For more information about EC-Council, please visit http://www.eccouncil.org

“I greatly enjoyed the ECES. It was challenging and also fun to learn about cryptography.

It will assist my office in providing assistance to the district attorney for investigation into white collar crime cases.”

- Edith M. SantosSpecial Investigator, Dallas County District

Attorney’s OfficeUSA

Page 6: EC-Council Certi ed Encryption Specialist · Administrator (ENSA), Computer Hacking Forensics Investigator (CHFI), Disaster Recovery Professional (EDRP), Certified Security Analyst

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

EC-Council Certified Encryption SpecialistCertified

SEncryption Specialist

TM

CE EEC-Council

05

EC-Councilwww.eccouncil.org/eces