(301) 220 2802
Prevention is better than the cure according to the age-old saying, and it's no truer than in the world of cybersecurity and IT networking. In our ECES - Certified Encryption Specialist training course we'll teach you techniques to secure your organizations' data using unique algorithms to convert, store, locate, and retrieve information that’s been stored different ways. You will also learn how to set up and secure a virtual private network (VPN).
This course is offered at our two training locations in Ashburn, VA, and Greenbelt, MD. The training course includes three days of intense, hands-on training which will enlighten attendees on the importance of encryption to many of today’s businesses. Students will also learn about cryptography best practices as well as common mistakes to watch out for. Knowing about various types of encryption technologies allows a person to utilize the one which will be the best fit for any given organization.
For more information about your specific needs, call us at (301) 220 2802 or complete the form below:
Learn More About ECES
We schedule this course periodically throughout the year. If there are no dates shown below we are in the process of organizing the next class. Call us at (301) 220 2802 to find out when the next class will be held.
Why Take ECES Training?
The EC-Council’s ECES - Certified Encryption Specialist is a program which will get attendees familiar with and excited about cryptography. Many well-known brands and companies just are not up to standard when it comes to multi-level encryption. This has led to a lot of recent successful attacks which potentially could have been avoided if someone would have put more time into areas like Wi-Fi, VoIP, and email encryptions. The goal of our encryption specialist training class is to use unique algorithms to convert, store, locate, and retrieve information that’s been stored in various ways.
By the end of this 3-day course attendees will know how to set up and secure a virtual private network (VPN). Encrypting a VPN provides security so that information sent through it from a connected computer will stay isolated from others who are tapped into the same network. This allows information to be sent securely to destinations like the Internet, remote computers, and printers.
Attendees will also be able to successfully encrypt a drive. Encrypted drives have an extra level of protection and can remain concealed should they fall into the wrong hands. Gaining access to an encrypted drive is nearly impossible unless the encryption algorithm is known.
This course is offered at our two training locations in Ashburn, VA, and Greenbelt, MD. The training course includes 3 days of intense, hands-on training which will enlighten attendees on the importance of encryption to many of today’s businesses. Students will also learn about cryptography best practices as well as common mistakes to watch out for. Knowing about various types of encryption technologies allows a person to utilize the one which will be the best fit for any given organization.
What you need to know before taking ECES training
Students who finish his course and become certified will be able to enter the computer security field with proficiency in an additional skill that other professionals may not be especially familiar with. Pentesters and ethical hackers are great candidates for this course. CES provides a great skill set for these individuals to take with them and apply when performing penetration tests. The certification training will introduce them to encryption analysis which can be applied should they come across cryptography. Overall, anyone in the field of computer security will benefit greatly by setting aside 3 days to obtain CES training and certification.
Exam and Certification Requirements:
This course helps you prepare for EC-Council’s Certified Encryption Specialist certification exam. The examination consists of 50 multiple choice questions given in a two hour period.
Who needs ECES Certification?
- Information Technology Specialist
- Cyber Risk Data Protection / Encryption / DLP Specialist Leader
- INFOSEC/Cybersecurity Specialist
- IT Security Specialist
Skills and Concepts:
- Overview of algorithms such as Blowfish, Twofish, and Skipjack
- Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others
- Asymmetic cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA
- Significant concepts such as diffusion, confused, and Kerkschoff’s principle