Certified Encryption Specialist Practice Exam
The EC-Council Certified Encryption Specialist (ECES) program serves as an introduction to cryptography for professionals and students. Participants delve into the fundamentals of contemporary symmetric and key cryptography, exploring the details of algorithms like Feistel Networks, DES, and AES. Additionally, the program covers:
- Overview of other algorithms such as Blowfish, Twofish, and Skipjack
- Hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256, and others
- Asymmetric cryptography with detailed explanations of RSA, Elgamal, Elliptic Curve, and DSA
- Key concepts such as diffusion, confusion, and Kerkchoff's principle
Who should take the exam?
- Individuals involved in VPN or digital certificate selection and implementation should consider this.
- Those with an understanding of cryptography.
- Ethical hackers and penetration testing professionals benefit greatly from this course, as many penetration testing courses overlook cryptoanalysis.
Exam Details
- Exam Name: Certified Encryption Specialist
- Exam Duration: 2 hours
- Exam Language: English
- Number of Questions: 50 Multiple Choice
- Passing Score: 70%
Course Outline
The Exam covers the following topics -
Topic 1: Overview and History of Cryptography 8%
- Overview of Cryptography
- Understanding Mono-Alphabet Substitution Cryptographic Algorithms
- Understanding Multi-Alphabet
- Substitution Cryptographic Algorithms
- Understanding Homophonic
- Substitution Cryptographic Algorithms
Topic 2: Understand Symmetric Cryptography and Hashes 44%
- Overview of Symmetric Cryptography
- Understanding Basic Binary Math in Cryptography
- Understanding Symmetric Block Cipher Algorithms
- Understanding Symmetric Algorithm Methods
- Overview of Symmetric Stream Ciphers
- Overview of Cryptographic Hash Algorithms
Topic 3: Learn about Number Theory and Asymmetric Cryptography 14%
- Overview of Asymmetric Cryptography
- Understanding Basic Number Facts
- Understanding Birthday Theorem
- Understanding Random Number Generators
- Overview of Asymmetric Encryption Algorithms
Topic 4: Understand Applications of Cryptography 24%
- Overview of Digital Signatures, Digital
- Certificates, and Digital Certificate Management
- Understanding Authentication Protocols
- Understanding Wi-Fi Encryption, SSL, and TLS
- Understanding VPN and Protocols Used to Create VPN
- Understanding File and Disk Encryption
- Overview of Steganography and Steganalysis
- Overview of National Security Agency Encryption Algorithms
Topic 5: Understand Cryptanalysis 10%
- Overview of Cryptanalysis
- Understanding Cryptanalysis Techniques
- Overview of Cryptanalysis Resources and Success
- Understanding Password Cracking