EC-Council Certified Encryption Specialist (E|CES)

canvas eccouncil2canvas2014 2canvas Encryption Specialistcanvas Specialistcanvas ECES

Computek is one of the largest and first Ec-council learning solution in egypt with 20 years of experience delivering training and certifications in all technologies.All Ec-Council Training in computek is held by Ec-Council Certified Instructors with over than 10 years experience in the technical and training field .




The EC-Council Certified Encryption Specialist (E|CES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES. Other topics introduced:


Overview of other algorithms such as Blowfish, Twofish, and Skipjack


Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others.


Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.


Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.


Participants will also be provided a practical application of the following:

How to set up a VPN

Encrypt a drive

Hands-on experience with steganography

Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.


Anyone involved in selecting, implementing VPN’s or digital certificates should attend this course first.  Without understanding the cryptography at some depth, people are limited to following marketing hype.  Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely.  Many penetration testing professionals testing usually don’t attempt to crack cryptography.  A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

eces-exam-infoExam info

Number of Questions: 50

Passing Score: 70%

Test Duration: 2 Hours

Test Format: Multiple Choice

Test Delivery: EC-Council Exam Center (ECC EXAM)

Course/Class Duration: 3 days / 20 hours



canvas ECEScourse222outline333

Introduction and History of Cryptography

What is Cryptography?


Mono-Alphabet Substitution

Caesar Cipher

Atbash Cipher

ROT 13


Single Substitution Weaknesses

Multi-Alphabet Substitution

Cipher Disk

Vigenère Cipher

Vigenère Cipher: Example

Breaking the Vigenère Cipher


The ADFGVX cipher

The Enigma Machine


Symmetric Cryptography & Hashes

Symmetric Cryptography

Information Theory

Information Theory Cryptography Concepts

Kerckhoffs's Principle



Substitution and Transposition

Binary M


Binary AND

Binary OR

Binary XOR

Block Cipher vs. Stream Cipher

Symmetric Block Cipher Algorithms

Basic Facts of the Feistel Function

The Feistel Function

A Simple View of a Single Round

Unbalanced Feistel Cipher






AES General Overview

AES Specifics






Symmetric Algorithm Methods

Electronic Codebook (ECB)

Cipher-Block Chaining (CBC)

Propagating Cipher-Block Chaining (PCBC)

Cipher Feedback (CFB)

Output Feedback (OFB)

Counter (CTR)

Initialization Vector (IV)

Symmetric Stream Ciphers

Example of Symmetric Stream Ciphers: RC4

Example of Symmetric Stream Ciphers: FISH

Example of Symmetric Stream Ciphers: PIKE


Hash – Salt


The MD5 Algorithm


Secure Hash Algorithm (SHA)

Fork 256

RIPEMD – 160




Number Theory and Asymmetric Cryptography

Asymmetric Encryption

Basic Number Facts

Prime Numbers


Eulers Totient

Modulus Operator

Fibonacci Numbers

Birthday Problem

Birthday Theorem

Birthday Attack

Random Number Generators

Classification of Random Number Generators

Naor-Reingold and Mersenne Twister Pseudorandom Function

Linear Congruential Generator

Lehmer Random Number Generator

Lagged Fibonacci Generator


Rivest Shamir Adleman (RSA)

RSA – How it Works

RSA Example


Digital Signature Algorithm

Signing with DSA

Elliptic Curve

Elliptic Curve Variations



Applications of Cryptography 1

Digital Signatures

What is a Digital Certificate?

Digital Certificates


X.509 Certificates

X.509 Certificate Content

X.509 Certificate File Extensions

Certificate Authority (CA)

Registration Authority (RA)

Public Key Infrastructure (PKI)

Digital Certificate Terminology

Server-based Certificate Validation Protocol

Digital Certificate Management

Trust Models

Certificates and Web Servers

Microsoft Certificate Services

Windows Certificates: certmgr.msc


Password Authentication Protocol (PAP)

Shiva Password Authentication Protocol (S-PAP)

Challenge-Handshake Authentication Protocol (CHAP)


Components of Kerberos System

Pretty Good Privacy (PGP)

PGP Certificates

Wifi Encryption

Wired Equivalent Privacy (WEP)

WPA - Wi-Fi Protected Access




Virtual Private Network (VPN)

Point-to-Point Tunneling Protocol (PPTP)


Layer 2 Tunneling Protocol VPN

Internet Protocol Security VPN


Encrypting Files

Backing up the EFS key

Restoring the EFS Key


Bitlocker: Screenshot

Disk Encryption Software: Truecrypt


Steganography Terms

Historical Steganography

Steganography Details

Other Forms of Steganography

Steganography Implementations



Steganalysis – Raw Quick Pair

Steganalysis - Chi-Square Analysis

Steganalysis - Audio Steganalysis

Steganography Detection Tools

National Security Agency and Cryptography

NSA Suite A Encryption Algorithms

NSA Suite B Encryption Algorithms

National Security Agency: Type 1 Algorithms

National Security Agency: Type 2 Algorithms

National Security Agency: Type 3 Algorithms

National Security Agency: Type 4 Algorithms

Unbreakable Encryption

Applications of Cryptography 2

Breaking Ciphers


Frequency Analysis


Cracking Modern Cryptography

Cracking Modern Cryptography: Chosen Plaintext Attack

Linear Cryptanalysis

Differential Cryptanalysis

Integral Cryptanalysis

Cryptanalysis Resources

Cryptanalysis Success

Rainbow Tables

Password Cracking


become an ethical hackerbecoma a forensic Investigator
become a secure computer userbecome an Enryption Specialist
become a network security administratorBecome a Network Defense Architect

  •                         ec-council-logo-reflection
need best quotation for a training course in egypt call


We are committed to providing our customers with the best service and products available.

100% satisfaction guarantee

why students prefer computek as the best training center in egypt new

1.Computek Training Center has trained over 1,000,000 trainees in Egypt and over 100,000 trainees in Middle East and africa.

2.Our programs are designed to meet our clients' training necessities including budget and time limitation.

3.We will cooperate with you to bring out effective programs fitting your organization.

4.Computek Training Center provides customer-focus training in mutable deliverymethods offering top quality training and high qualified instructor to meet individual learning styles and organization profession training.

5.Computek instructors are selected from the best of training professional instructors in Egypt who awarded the trust worthy certified international companies, Computek instructors not only provide superior education but also reliable work experience in the field of giving courses

6.Trainees prefer Computek Training Center not only due to our high quality training but also for our reasonable and cost-effective price list.

7.Computek Classroom is designed with cutting edge facilities strong from hardware and software technologies to the most sophisticated educational aids.

8.The information desk with our friendly and professional customers support representative is highly qualified to answer any questions and also deliver your unique requirements.

9.Computek Training Center staff is available 7 days in week from 10:00 AM to 10:00 PM to deal with any inquiries and assist student with anything they need.

10.Computek Training Center is partner of world's technology leads such as Microsoft, Cisco, Compatia, EC Council ,Adobe , Autodesk, prometric and Pearson VUE.

All Rights Reseved ©