Skip to product information
1 of 1

EC-Council

EC-Council Certified Encryption Specialist (E|CES) (Self-Paced)

EC-Council Certified Encryption Specialist (E|CES) (Self-Paced)

Regular price $1,833.00 CAD
Regular price Sale price $1,833.00 CAD
Sale Sold out
Delivery Format

EC-Council’s Certified Encryption Specialist (E|CES) program is designed to introduce professionals and students to the intricate field of cryptography. Covering a broad spectrum of topics, the E|CES program delves into modern symmetric key cryptography, offering detailed insights into Feistel Networks, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) algorithms. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more. The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on Rivest-Shamir-Adleman (RSA), Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA). Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

Completing the E|CES program empowers individuals to make informed decisions in selecting suitable encryption standards for their organizations. E|CES candidates learn the theoretical aspects of cryptography and possess the practical skills necessary for effective technology deployment. This includes the ability to implement encryption techniques, secure data with VPNs, and navigate the complexities of emerging technologies like quantum computing, making them valuable assets in cybersecurity.

View full details

Course brochure