Existing User Login

New User? Create An Account

Request new password

We are iCollege

Established in 2003 under the parent company XpertSkills, iCollege is one of the most trusted marketplaces in E-Learning. Our dedication transcends mere content – we source learning products from only the best suppliers and vendors across the globe so you have the widest selection of educational courses designed to equip you for success.

Headquartered in stunning South Africa, our distributed company spans 3 continents with employees in the U.S., India, and of course, South Africa. Our customers call more than 120 countries home. We're proud to say iCollege is trusted by leading organizations in major tech hubs, including Silicon Valley, to train and equip employees to be the very best that they can be.

Whether partnering with Fortune 500 companies or being part of an individual's journey toward career growth, we are committed to the success of all who trust us as their source for education and training.

Contact Details:

Web: www.xpertskills.com
Skype: xpertskills
Mail: info@xpertskills.com

Physical Address:

Head Office - South Africa
16 Monte Carlo Crescent
Kyalami business Park
Johannesburg
South Africa 1684

You are here

Certified Encryption Specialist (ECES)

E-COURSE:

Certified Encryption Specialist (ECES)

Instructor-led, video based E-Learning course.
Overview

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES.

 Many penetration testing professionals testing usually don’t attempt to crack cryptography. A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

Objectives
  • Types of Encryption Standards and their differences
  • How to select the best standard for your organization
  • How to enhance your pen-testing knowledge in encryption
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies
Target Audience
  • Penetration Testers
  • Ethical Hackers
  • Vulnerability Assessment Auditors
  • Risk Assessment Administrators
  • Network Administrators
  • Application Security Engineers
  • Cyber Forensic Investigators/ Analyst and SOC Analyst
  • System Administrators/Engineers
  • Firewall Administrators and Network Managers/IT Managers
Instructor: ITProTV

ITProTV delivers the IT instruction that you need to advance or launch your IT career in a fun and creative way. With attractive studios and an interactive, talk-show style format, you'll watch more and learn more. From CompTIA, Cisco, and Microsoft to Security and Cloud Fundamentals, you can learn it all. Dive deep into one or master many with the friendly faces of IT training.

  1. INTRODUCTION AND HISTORY OF CRYPTOGRAPHY
1
Start
Overview
2
Start
History Of Cryptography
3
Start
History Of Cryptography Part 2
4
Start
History Of Cryptography Part 3
5
Start
Crypto Definitions
6
Start
Crypto Definitions Part 2
7
Start
Crypto Definitions Part 3
  1. SYMMETRIC CRYPTOGRAPHY & HASHES
8
Start
Symmetric Cryptography And Hashes
9
Start
Symmetric Cryptography And Hashes Part 2
10
Start
Symmetric Cryptography And Hashes Part 3
11
Start
Symmetric Cryptography And Hashes Part 4
12
Start
Symmetric Cryptography And Hashes Part 5
13
Start
Symmetric Cryptography And Hashes Part 6
14
Start
Symmetric Cryptography And Hashes Part 7
  1. NUMBER THEORY AND ASYMMETRIC CRYPTOGRAPHY
15
Start
Asymmetric Cryptography
16
Start
Asymmetric Cryptography Part 2
17
Start
Asymmetric Cryptography Part 3
  1. APPLICATIONS OF CRYPTOGRAPHY
18
Start
Applications Of Cryptography
19
Start
Applications Of Cryptography Part 2
20
Start
Applications Of Cryptography Part 3
21
Start
Applications Of Cryptography Part 4
22
Start
Applications Of Cryptography Part 5
23
Start
Applications Of Cryptography Part 6
24
Start
Cryptanalysis
25
Start
Cryptanalysis Part 2
E-COURSE Instructor-led, video based E-Learning course.
USD 19
  • 13:59:00
    Hours of learning
  • Receive a Certificate of Excellence on successful completion
  • Presented by highly qualified, industry leading experts
  • 12 Months access
  • 10-Day money-back guarantee
Back to Top