EC-Council Certified Encryption Specialist (ECES) Training and Certification

Craw Security
Last Update February 25, 2021
0 already enrolled

About This Course

EC-Council Certified Encryption Specialist Training introduces the skills of network security, computer forensics. In ECES Training and certification students learn intrusion detection systems, viruses, and worms. Online ECES Training introduces foundations of modern symmetric and key cryptography and Hashing algorithms. ECES Training and Certification is excellent for ethical hackers and penetration testing professionals.

EC Council Certified Encryption Specialist

ECES Training & Certification Course Content

Click here to view

01 : What is Cryptography
02 : History
03 : Mono-Alphabet Substitution
04 : Caesar Cipher
05 : Atbash Cipher
06 : ROT 13
07 : Scytale
08 : Single Substitution Weaknesses
09 : Multi-Alphabet Substitution
10 : Cipher Disk
11 : Vigenère Cipher
12 : Vigenère Cipher: Example
13 : Breaking the Vigenère Cipher
14 : Playfair
15 : The ADFGVX cipher
16 : The Enigma Machine
17 : CrypTool

Learn more about the ECES Course

Online ECES Course Training Program

ECES Training and Certification is excellent for ethical hackers and penetration testing professionals.

Who this Eccouncil Certified Encryption Specialist Training course is for :


About The Exam

What is NEW in ECES Training and Certification Course?

Live 1 : 1 Online Training Classes

ECES Training & Certification Course

In the age of Information overload

Join our Telegram & Signal groups to get small capsules of relevant updates, industry trends & resources.

Featured Review


Ramansh Sharma

Google Review

My experience at CRAW security was marvelous. They really have good and experienced teachers and faculty members are very supportive. Being a student at CRAW security is like having a safe and secure career journey. I am glad that i did my internship at CRAW security.
280 Students also bought Cyber Security Course

Enroll Now to Get Details on Plans & Pricing

Learning Objectives

Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies


  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / OS X / Linux.
  • For WiFi cracking (10 lectures ONLY) - Wireless adapter that supports monitor mode (more info provided in the course).

Target Audience

  • Employee
  • Business Analysis
  • Students



Module 01 : What is Cryptography

Module 02 : History

Module 03 : Mono-Alphabet Substitution

Module 04 : Caesar Cipher

Module 05 : Atbash Cipher

Module 06 : ROT 13

Module 07 : Scytale

Module 08 :Single Substitution Weaknesses

Module 09 : Multi-Alphabet Substitution

Module 10 : Cipher Disk

Module 11 : Vigenère Cipher

Module 12 : Vigenère Cipher: Example

Module 13 : Breaking the Vigenère Cipher

Module 14 : Playfair

Module 15 : The ADFGVX cipher

Module 16 : The Enigma Machine

Module 17 : CrypTool

Your Instructors

Craw Security

16 Courses
0 Reviews
4 Students
See more

Write a review

Write a review


6% off
Duration 40 hours
English Hindi

Material Includes

  • Books
  • Toolkit
  • Videos
  • Softwares

Click here to

Book Your Demo

+91 7428106667 | +91 9643648668
[email protected]