EC-Council Certified Encryption Specialist (ECES) Training and Certification
About This Course
Learning Objectives
Types of Encryption Standards and their differences
How to select the best standard for your organization
How to enhance your pen-testing knowledge in encryption
Correct and incorrect deployment of encryption technologies
Common mistakes made in implementing encryption technologies
Best practices when implementing encryption technologies
Requirements
- Basic IT Skills
- No Linux, programming or hacking knowledge required.
- Computer with a minimum of 4GB ram/memory.
- Operating System: Windows / OS X / Linux.
- For WiFi cracking (10 lectures ONLY) - Wireless adapter that supports monitor mode (more info provided in the course).
Target Audience
- Employee
- Business Analysis
- Students
Curriculum
40h