Live Online Style Video +Live Instructor + Official Courseware + Hands-on Labs

EC-Council Certified Encryption Specialist -ECES(PKI)

Includes:

  1. Power Packed 07 Hours (Edited from 24 hours of Live Training)
  2. 6 months access to videos.
  3. Access via Laptop, Tab, Mobile, and Smart TV.
  4. Certificate of Completion.
  5. Official Courseware
  6. 100+ Tests Questions (Qubits42)
You can also purchase an annual plan for USD 999. For one year, all Flexi Videos will be free for you. Buy Annual Plan

You will get access to Flexi Video instantly.

Flexi Video

USD 99

Official Courseware1

USD 139

Hands-On-Labs

NA

1Delivery lead time is 5 Days

Total

USD 99

100% Refund for Flexi Video (courseware is non-refundable) if user is not satisfied with the Video and seeks refund within 30 days of purchase.

Download Course Contents
Module 1: Introduction and History of Cryptography
  • What is Cryptography?
  • History
  • Mono-Alphabet Substitution
  • Caesar Cipher
  • Atbash Cipher
  • ROT 13
  • Scytale
  • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
  • Cipher Disk
  • Vigenère Cipher
  • Vigenère Cipher: Example
  • Breaking the Vigenère Cipher
  • Playfair
  • The ADFGVX cipher
  • The Enigma Machine
  • CrypTool
  • Symmetric Cryptography
  • Information Theory
  • Information Theory Cryptography Concepts
  • Kerckhoffs's Principle
  • Substitution
  • Transposition
  • Substitution and Transposition
  • Binary M
  • ath
  • Binary AND
  • Binary OR
  • Binary XOR
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
  • Basic Facts of the Feistel Function
  • The Feistel Function
  • A Simple View of a Single Round
  • Unbalanced Feistel Cipher
  • DES
  • 3DES
  • DESx
  • Whitening
  • AES
  • AES General Overview
  • AES Specifics
  • Blowfish
  • Serpent
  • Twofish
  • Skipjack
  • IDEA
  • Symmetric Algorithm Methods
  • Electronic Codebook (ECB)
  • Cipher-Block Chaining (CBC)
  • Propagating Cipher-Block Chaining (PCBC)
  • Cipher Feedback (CFB)
  • Output Feedback (OFB)
  • Counter (CTR)
  • Initialisation Vector (IV)
  • Symmetric Stream Ciphers
  • Example of Symmetric Stream Ciphers: RC4
  • Example of Symmetric Stream Ciphers: FISH
  • Example of Symmetric Stream Ciphers: PIKE
  • Hash
  • Hash – Salt
  • MD5
  • The MD5 Algorithm
  • MD6
  • Secure Hash Algorithm (SHA)
  • Fork 256
  • RIPEMD – 160
  • GOST
  • Tiger
  • CryptoBench
  • Asymmetric Encryption
  • Basic Number Facts
  • Prime Numbers
  • Co-Prime
  • Eulers Totient
  • Modulus Operator
  • Fibonacci Numbers
  • Birthday Problem
  • Birthday Theorem
  • Birthday Attack
  • Random Number Generators
  • Classification of Random Number Generators
  • Naor-Reingold and Mersenne Twister Pseudorandom Function
  • Linear Congruential Generator
  • Lehmer Random Number Generator
  • Lagged Fibonacci Generator
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
  • RSA – How it Works
  • RSA Example
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
  • Signing with DSA
  • Elliptic Curve
  • Elliptic Curve Variations
  • Elgamal
  • CrypTool
  • Digital Signatures
  • What is a Digital Certificate?
  • Digital Certificates
  • X.509
  • X.509 Certificates
  • X.509 Certificate Content
  • X.509 Certificate File Extensions
  • Certificate Authority (CA)
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
  • Password Authentication Protocol (PAP)
  • Shiva Password Authentication Protocol (S-PAP)
  • Challenge-Handshake Authentication Protocol (CHAP)
  • Kerberos
  • Components of Kerberos System
  • Pretty Good Privacy (PGP)
  • PGP Certificates
  • Wifi Encryption
  • Wired Equivalent Privacy (WEP)
  • WPA - Wi-Fi Protected Access
  • WPA2
  • SSL
  • TLS
  • Virtual Private Network (VPN)
  • Point-to-Point Tunneling Protocol (PPTP)
  • PPTP VPN
  • Layer 2 Tunneling Protocol VPN
  • Internet Protocol Security VPN
  • SSL/VPN
  • Encrypting Files
  • Backing up the EFS key
  • Restoring the EFS Key
  • Bitlocker
  • Bitlocker: Screenshot
  • Disk Encryption Software: Truecrypt
  • Steganography
  • Steganography Terms
  • Historical Steganography
  • Steganography Details
  • Other Forms of Steganography
  • Steganography Implementations
  • Demonstration
  • Steganalysis
  • Steganalysis – Raw Quick Pair
  • Steganalysis - Chi-Square Analysis
  • Steganalysis - Audio Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
  • NSA Suite A Encryption Algorithms
  • NSA Suite B Encryption Algorithms
  • National Security Agency: Type 1 Algorithms
  • National Security Agency: Type 2 Algorithms
  • National Security Agency: Type 3 Algorithms
  • National Security Agency: Type 4 Algorithms
  • Unbreakable Encryption
  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
  • Cracking Modern Cryptography: Chosen Plaintext Attack
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools
Prabin Singh

Certifications

Skills

 
EC-Council:Advanced Network DefenseBCS:Certificate in Information Security Management Principles (CISMP)
EC-Council:Certified Chief Information Security Officer( CCISO )EC-Council:Certified Ethical Hacker V11 -CEH-v11
EC-Council:Certified Ethical Hacker v12 - CEHv12ISACA:Certified Information Security Manager (CISM)
(ISC)2:Certified Information Systems Security Professional (CISSP)PECB:Certified Lead Forensics Examiner
EC-Council:Certified Penetration Testing Professional - CPENTEC-Council:Certified SOC Analyst-CSA
EC-Council:CHFI V10(ISC)2:CISSP Certification Prep Course
(ISC)2:CISSP-ISSMPEC-Council:CND V2
CompTIA:CompTIA Advanced Security Practitioner (CASP+)(CAS-004)CompTIA:CompTIA Cybersecurity Analyst (CySA+)
CompTIA:CompTIA Pentest+CompTIA:CompTIA Pentest+ ( PT0-002)
CompTIA:CompTIA-SY0-601-Security+EC-Council:Computer Hacking Forensic Investigator (CHFI) V9

Learn more about Koenig. Download Presentation Buy Other Flexi

FAQ's

Yes, you can pay from this web page.
Yes, the site is secure by utilizing Secure Sockets Layer (SSL) Technology. SSL technology enables the encryption of sensitive information during online transactions. We use the highest assurance SSL/TLS certificate, which ensures that no unauthorized person can get to your sensitive payment data over the web.
We use the best standards in Internet security. Any data retained is not shared with third parties.
You will be provided access to LET ( Learning Enhancement Tool), where you will get the links to access all your purchases.
Flexi video for the new version will be provided free of cost.
6 months from the date of delivery.
Yes, you do. Flexi Videos do not include Courseware or Labs.
Yes, contact us for corporate packages.
Yes, c/w and Lab are not included in the annual plan. All Flexi videos are included.
It is only for one user.
Videos can only be streamed and not downloaded.
We do not track the pass rate of Flexi students. However, we trust it will be lower than for Live Online.
Presently, Flexi is only available in English.
It’s a unique subscription plan where customers can avail unlimited Flexi courses within a year.
The subscription plan is valid for 1 year from the date of purchase.
No, this is limited to one user and its non-transferable.

Feedbacks from Clients