Overview

Covering a broad spectrum of topics, the E|CES course delves into modern symmetric key cryptography, offering detailed insights into algorithms like Feistel Functions, DES, and AES. Additionally, students gain familiarity with various other algorithms, including Blowfish, Twofish, Skipjack, CAST, TEA, and more.

The curriculum extends to information theory basics as applied to cryptography, covering essential concepts such as hashing algorithms (MD5, MD6, SHA, GOST, RIPMD 256) and asymmetric cryptography with in-depth discussions on RSA, Elgamal, Elliptic Curve, and Digital Signature Algorithm (DSA).

Throughout the program, students delve into crucial cryptographic principles like diffusion, confusion, and Kerckhoff’s principle. Practical application is emphasized, enabling students to work with cryptographic algorithms from classical ciphers like the Caesar cipher to contemporary methods such as AES and RSA. Beyond theory, the course equips students with hands-on experience setting up a VPN, encrypting a drive, and exploring steganography. Furthermore, E|CES provides practical cryptanalysis and quantum computing knowledge, ensuring a comprehensive understanding of traditional and cutting-edge cryptographic concepts.

Skills Covered

  • Types of encryption standards and their differences
  • How to select the best standard for your organization
  • How to enhance your pen‐testing knowledge in encryption
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies
  • Quantum computing and cryptography

Who Should Attend

  • Penetration Testers and Computer Forensics Specialists
  • Cloud security architects, designers, and developers
  • Anyone involved in selecting and implementing VPNs or digital certificates, or information security operations.
  • Anyone involved in developing operating systems, cryptography systems, blockchain based solutions, etc.

Course Curriculum

Prerequisites

  • No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.

Download Syllabus

Course Modules

Request More Information

Training Options

Intake: 19-21 May 2025
Duration: 3 Days
Guaranteed: TBC
Modality: VILT
Price:

RM4,700.00Enroll Now

Exam:
Intake: 19-21 May 2025
Duration: 3 Days
Guaranteed: TBC
Modality: ILT
Price:

RM4,700.00Enroll Now

Exam:
Intake: 11-13 Aug 2025
Duration: 3 Days
Guaranteed: TBC
Modality: VILT
Price:

RM4,700.00Enroll Now

Exam:
Intake: 11-13 Aug 2025
Duration: 3 Days
Guaranteed: TBC
Modality: ILT
Price:

RM4,700.00Enroll Now

Exam:
Intake: 19-21 Nov 2025
Duration: 3 Days
Guaranteed: TBC
Modality: VILT
Price:

RM4,700.00Enroll Now

Exam:
Intake: 19-21 Nov 2025
Duration: 3 Days
Guaranteed: TBC
Modality: ILT
Price:

RM4,700.00Enroll Now

Exam:

Exam & Certification

EC‐Council Certified Encryption Specialist Exam (212-81)

Completing the E|CES program empowers individuals to make informed decisions in selecting suitable encryption standards for their organizations. Candidates learn the theoretical aspects of cryptography and possess the practical skills necessary for effective technology deployment. This includes the ability to implement encryption techniques, secure data with VPNs, and navigate the complexities of emerging technologies like quantum computing, making them valuable assets in cybersecurity

Training & Certification Guide

Frequently Asked Questions