EC-Council Certified Encryption Specialist (E|CES)

EC-Council Encryption Specialist (ECES)

E|CES is a certification designed to introduce students and professionals to the world of modern cryptography. It covers symmetric algorithms (such as AES, DES, Blowfish), hashing algorithms, asymmetric cryptography (RSA, ElGamal, ECC), cryptanalysis, and emerging trends like quantum computing.

20 hours
Official Certificate
Expert Instructors
Online Learning
Certificación internacional EC-Council Encryption Specialist (E|CES)
EC-COUNCIL logo

E|CES is a certification designed to introduce students and professionals to the world of modern cryptography. It covers symmetric algorithms (such as AES, DES, Blowfish), hashing algorithms, asymmetric cryptography (RSA, ElGamal, ECC), cryptanalysis, and emerging trends like quantum computing.

At the end of the course, participants will be able to:

  • Understand encryption standards and when to use them
  • Correctly implement symmetric and asymmetric encryption
  • Avoid common mistakes when deploying encryption technologies
  • Apply cryptographic best practices
  • Understand quantum cryptography and its future implications
  • Perform cryptanalysis (cipher analysis and breaking)

No prior knowledge is required to participate in this training. It is intended for:

  • Pentesters and forensic analysts
  • Cloud security architects and developers
  • IT professionals managing VPNs, digital certificates, or blockchain
  • Anyone seeking to understand and implement encryption in systems

Certificación internacional EC-Council Encryption Specialist (E|CES) Applies
Certificación internacional EC-Council Encryption Specialist (E|CES) 20 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor (live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

The methodology seeks that the student does not memorize, but rather understands the concepts and how they are applied in a work environment.

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Pre-enrollment

You do not need to pay to pre-enroll. By pre-enrolling, you reserve a spot in the group for this course or program. Our team will contact you to complete your enrollment.

Pre-enroll now

Infinity Payments

Make your payment quickly, safely and reliably


- For bank transfer payments, request the details by email capacita@aulamatriz.edu.co.

- If you wish to finance your payment through our credit options
(Sufi, Cooperativa Unimos or Fincomercio), click on the following link:
Ver opciones de crédito.

To continue you must
Or if you don't have an account you must

Description

E|CES is a certification designed to introduce students and professionals to the world of modern cryptography. It covers symmetric algorithms (such as AES, DES, Blowfish), hashing algorithms, asymmetric cryptography (RSA, ElGamal, ECC), cryptanalysis, and emerging trends like quantum computing.

Objectives

At the end of the course, participants will be able to:

  • Understand encryption standards and when to use them
  • Correctly implement symmetric and asymmetric encryption
  • Avoid common mistakes when deploying encryption technologies
  • Apply cryptographic best practices
  • Understand quantum cryptography and its future implications
  • Perform cryptanalysis (cipher analysis and breaking)

No prior knowledge is required to participate in this training. It is intended for:

  • Pentesters and forensic analysts
  • Cloud security architects and developers
  • IT professionals managing VPNs, digital certificates, or blockchain
  • Anyone seeking to understand and implement encryption in systems

offers

Certificación internacional EC-Council Encryption Specialist (E|CES) Applies
Certificación internacional EC-Council Encryption Specialist (E|CES) 20 hours

Learning Methodology

The learning methodology, regardless of the modality (in-person or remote), is based on the development of workshops or labs that lead to the construction of a project, emulating real activities in a company.

The instructor(live), a professional with extensive experience in work environments related to the topics covered, acts as a workshop leader, guiding students' practice through knowledge transfer processes, applying the concepts of the proposed syllabus to the project.

La metodología persigue que el estudiante "does not memorize", but rather "understands" the concepts and how they are applied in a work environment."

As a result of this work, at the end of the training the student will have gained real experience, will be prepared for work and to pass an interview, a technical test, and/or achieve higher scores on international certification exams.

Conditions to guarantee successful results:
  • a. An institution that requires the application of the model through organization, logistics, and strict control over the activities to be carried out by the participants in each training session.
  • b. An instructor located anywhere in the world, who has the required in-depth knowledge, expertise, experience, and outstanding values, ensuring a very high-level knowledge transfer.
  • c. A committed student, with the space, time, and attention required by the training process, and the willingness to focus on understanding how concepts are applied in a work environment, and not memorizing concepts just to take an exam.

Course Modules

Module 1: Introduction and History of Cryptography

  • History and evolution of cryptography.

  • Classical ciphers such as Caesar, Atbash, and Enigma.

  • Substitution and transposition techniques.

  • Symmetric algorithms: AES, DES, Blowfish, Twofish.

  • Modes of operation: ECB, CBC, OFB, etc.

  • Hash algorithms: MD5, SHA, Haval, Whirlpool.

  • RSA, Elgamal, ECC, DSA.

  • Mathematical principles: primes, logarithms, modular algebra.

  • Random number generators and birthday attacks.

  • Public Key Infrastructure (PKI), digital certificates.

  • Authentication: Kerberos, EAP, PAP.

  • VPNs, Wi-Fi Encryption, SSL/TLS, BitLocker, Steganography.

  • Techniques for breaking encryptions.

  • Frequency analysis, known plaintext attacks, Rainbow Tables.

  • Post-quantum cryptography.

  • QKD (Quantum Key Distribution), quantum-resistant algorithms such as NTRU and GGH.