Fundamentals

Course Overview

Overview
The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES.

Other topics introduced:

  • Overview of other algorithms such as Blowfish, Twofish, and Skipjack
  • Hashing algorithms include MD5, MD6, SHA, Gost, RIPMD 256 and others.
  • Asymmetric cryptography includes thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA.
  • Significant concepts such as diffusion, confusion, and Kerkchoff’s principle.

Participants will also be provided a practical application of the following:

  • How to set up a VPN
  • Encrypt a drive
  • Hands-on experience with steganography
  • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.

Prerequisities
A basic knowledge of cryptanalysis is very beneficial to any penetration testing.

Audience Profile
Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

At Course Completion

  • Types of Encryption Standards and their differences
  • How to select the best standard for your organization
  • How to enhance your pen-testing knowledge in encryption
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies

Course Outline

  • Introduction and History of Cryptography
  • Symmetric Cryptography & Hashes
  • Number Theory and Asymmetric Cryptography
  • Applications of Cryptography
  • Cryptanalysis

Exam Code
212-81

2026 CLASSES
Jan Feb Mar Apr May Jun
9-11 20-22 8-10
Jul Aug Sep Oct Nov Dec
10-12 5-7 7-9

Overview
The EC-Council Certified Security Specialist (ECSS) is an entry-level security program that provides a holistic overview of the three key pillars of cybersecurity: Information Security, Network Security, and Computer Forensics. This course is designed to build a solid foundational knowledge base, enabling students to identify threats and implement general security controls to improve an organization’s security posture.

Unlike courses that focus on a single domain, ECSS acts as a “mini-masterclass” that prepares individuals for more advanced certifications like CEH (Certified Ethical Hacker) or CHFI (Computer Hacking Forensic Investigator).

Course Objectives & Learning Outcomes

  • Fundamental Security Skills: Understand the key issues plaguing information security and the importance of the CIA Triad (Confidentiality, Integrity, and Availability).
  • Networking & Protocols: Master the fundamentals of networks, the OSI model, TCP/IP, and secure network protocols.
  • Threat Identification: Learn to recognize various types of information security threats, hacking cycles, and social engineering techniques.
  • Defensive Controls: Understand the implementation and bypassing techniques of firewalls, IDS (Intrusion Detection Systems), and VPNs.
  • Digital Forensics: Gain a foundational understanding of the computer forensics investigation methodology and the digital evidence examination process.

Course Outline
The curriculum is divided into three primary tracks:

1. Information Security:

  • Social Engineering & Identity Theft.
  • Hacking Cycles & Stages.
  • Cryptography (PKI, Ciphers, and Cryptanalysis).

2. Network Security:

  • Identification, Authentication, and Authorization.
  • Firewall Technologies (Bastion Host, DMZ, Proxy Servers).
  • Wireless Network Security (Wi-Fi encryption and hacking tools).
  • Data Backup and Retention techniques.

3. Computer Forensics:

  • Digital Evidence & File Systems.
  • Windows Forensics & Network Traffic Analysis.
  • Steganography and Log Analysis.
  • Investigating Email Crimes and writing investigative reports.

Target Audience
This course is perfect for:

  • Students & Graduates: Looking to start a career in the cybersecurity domain.
  • IT Professionals: Such as System Administrators or Network Engineers who want to move into security.
  • Career Switchers: Individuals from non-technical backgrounds seeking a comprehensive entry point into security, hacking, and forensics.

Exam Code
ECSS

2026 CLASSES
Jan Feb Mar Apr May Jun
9-11 20-22 8-10
Jul Aug Sep Oct Nov Dec
10-12 5-7 7-9
WhatsApp chat