

EC-Council Certified Encryption Specialist (ECES)
Descrição do Curso
O programa EC-Council Certified Encryption Specialist (ECES) apresenta aos profissionais e estudantes o campo da criptografia. Os participantes aprendem os fundamentos da criptografia simétrica e de chave moderna, incluindo os detalhes de algoritmos como Feistel Networks, DES e AES. Outros tópicos apresentados:
• Visão geral de outros algoritmos, como Blowfish, Twofish e Skipjack
• Algoritmos de hash incluindo MD5, MD6, SHA, Gost, RIPMD 256 e outros.
• Criptografia assimétrica, incluindo descrições completas de RSA, Elgamal, Curva Elíptica e DSA.
• Conceitos significativos como difusão, confusão e princípio de Kerkchoff.
Os participantes também recebem uma aplicação prática do seguinte:
• Como configurar uma VPN
• Criptografar uma unidade
• Experiência prática com esteganografia
• Experiência prática em algoritmos criptográficos, desde cifras clássicas como Caesar Cyphe, até algoritmos modernos como AES e RSA.
Quem deve fazer
Qualquer pessoa envolvida na configuração e implementação de VPN’s ou certificados digitais devem fazer este treinamento. Profissionais que não entendem a criptografia com alguma profundidade ficam limitados, compreender a criptografia a fundo permite que você saiba qual selecionar.
O aluno que concluir este treinamento com sucesso será capaz de selecionar o padrão de criptografia mais eficaz para sua organização e entender como implantar essa tecnologia com eficiência.
Este treinamento é excelente para hackers éticos e profissionais de teste de penetração, pois a maioria dos treinamentos de Pentest ignora completamente a criptoanálise. Muitos profissionais de teste de penetração geralmente não tentam quebrar a criptografia. Um conhecimento básico de criptoanálise é muito benéfico para qualquer Pentest.

O que você vai aprender
• Tipos de padrões de criptografia e suas diferenças
• Como selecionar o melhor padrão para sua organização
• Como aprimorar seu conhecimento de teste de penetração em criptografia
• Implantação correta e incorreta de tecnologias de criptografia
• Erros comuns cometidos na implementação de tecnologias de criptografia
• Práticas recomendadas ao implementar tecnologias de criptografia
Informações do exame
Duração do teste: 2 horas
Formato do teste: Teste de múltipla escolha
Entrega: EC-Council Exam Center (ECC EXAM)
Duração do curso/aula: 3 dias / 20 horas
Inscreva-se agora para obter detalhes
sobre planos e preços
Resumo do Curso ECES
-
01. Introdução e História da Criptografia
-
02. Criptografia Simétrica e Hashes
-
03. Teoria dos Números e Criptografia Assimétrica
-
04. Aplicações da Criptografia
-
05. Criptoanálise
Introduction and History of Cryptography
- What is Cryptography?
- History of Cryptography
- Mono-Alphabet Substitution
- Caesar Cipher
- Atbash Cipher
- Affine Cipher
- ROT13 Cipher
- Scytale
- Single Substitution Weaknesses
- Multi-Alphabet Substitution
- Cipher Disk
- Vigenère Cipher
- Vigenère Cipher: Example
- Breaking the Vigenère Cipher
- Playfair Cipher
- ADFGVX Cipher
- Homophonic Substitution
- Null Ciphers
- Book Ciphers
- Rail Fence Ciphers
- The Enigma Machine
- CrypTool
Symmetric Cryptography & Hashes
- Symmetric Cryptography
- Information Theory
- Information Theory Cryptography Concepts
- Kerckhoffs’s Principle
- Substitution
- Transposition
- Binary Math
- Binary AND
- Binary OR
- Binary XOR
- Block Cipher vs. Stream Cipher
- Symmetric Block Cipher Algorithms
- Basic Facts of the Feistel Function
- The Feistel Function
- Unbalanced Feistel Cipher
- Data Encryption Standard (DES)
- 3DES
- DESx
- Whitening
- Advanced Encryption Standard (AES)
- AES General Overview
- AES Specifics
- Blowfish
- Serpent
- Twofish
- Skipjack
- International Data Encryption Algorithm (IDEA)
- CAST
- Tiny Encryption Algorithm (TEA)
- SHARK
- Basic Facts of the Feistel Function
- Symmetric Algorithm Methods
- Electronic Codebook (ECB)
- Cipher-Block Chaining (CBC)
- Propagating Cipher-Block Chaining (PCBC)
- Cipher Feedback (CFB)
- Output Feedback (OFB)
- Counter (CTR)
- Initialization Vector (IV)
- Symmetric Stream Ciphers
- Example of Symmetric Stream Ciphers: RC4
- Example of Symmetric Stream Ciphers: FISH
- Example of Symmetric Stream Ciphers: PIKE
- Hash Function
- Hash – Salt
- MD5
- The MD5 Algorithm
- MD6
- Secure Hash Algorithm (SHA)
- FORK-256
- RIPEMD-160
- GOST
- Tiger
- MAC and HMAC
- CryptoBench
Number Theory and Asymmetric Cryptography
- Asymmetric Encryption
- Basic Number Facts
- Prime Numbers
- Co-Prime Numbers
- Euler’s Totient
- Modulus Operator
- Fibonacci Numbers
- Birthday Theorem
- Birthday Paradox
- Birthday Paradox: Probability
- Birthday Attack
- Birthday Paradox
- Random Number Generator
- Classification of Random Number Generator
- Traits of a Good PRNG
- Naor-Reingold and Mersenne Twister Pseudorandom Function
- Linear Congruential Generator
- Lehmer Random Number Generator
- Lagged Fibonacci Generator (LFG)
- Blum Blum Shub
- Yarrow
- Fortuna
- Diffie-Hellman
- Rivest Shamir Adleman (RSA)
- RSA – How it Works
- RSA Example
- Menezes–Qu–Vanstone
- Digital Signature Algorithm
- Signing with DSA
- Elliptic Curve
- Elliptic Curve Variations
- Elgamal
- CrypTool
Applications of Cryptography
- FIPS Standards
- Digital Signatures
- What is a Digital Certificate?
- Digital Certificates
- X.509
- X.509 Certificates
- X.509 Certificate Content
- X.509 Certificate File Extensions
- Digital Certificates
- Certificate Authority (CA)
- Certificate Authority – Verisign
- Registration Authority (RA)
- Public Key Infrastructure (PKI)
- Digital Certificate Terminology
- Server-based Certificate Validation Protocol
- Digital Certificate Management
- Trust Models
- Certificates and Web Servers
- Microsoft Certificate Services
- Windows Certificates: certmgr.msc
- Authentication
- Password Authentication Protocol (PAP)
- Shiva Password Authentication Protocol (S-PAP)
- Challenge-Handshake Authentication Protocol (CHAP)
- Kerberos
- Components of Kerberos System
- Kerberos Authentication Process
- Pretty Good Privacy (PGP)
- PGP Certificates
- Wi-Fi Encryption
- Wired Equivalent Privacy (WEP)
- WPA – Wi-Fi Protected Access
- WPA2
- SSL
- TLS
- Virtual Private Network (VPN)
- Point-to-Point Tunneling Protocol (PPTP)
- PPTP VPN
- Layer 2 Tunneling Protocol VPN
- Internet Protocol Security VPN
- SSL/TLS VPN
- Point-to-Point Tunneling Protocol (PPTP)
- Encrypting Files
- Backing up the EFS key
- Restoring the EFS Key
- BitLocker
- BitLocker: Screenshot
- Disk Encryption Software: VeraCrypt
- Common Cryptography Mistakes
- Steganography
- Steganography Terms
- Historical Steganography
- Steganography Details
- Other Forms of Steganography
- How to Embed?
- Steganographic File Systems
- Steganography Implementations
- Demonstration
- Steganalysis
- Steganalysis – Raw Quick Pair
- Steganalysis – Chi-Square Analysis
- Steganalysis – Audio Steganalysis
- Steganography Detection Tools
- National Security Agency and Cryptography
- NSA Suite A Encryption Algorithms
- NSA Suite B Encryption Algorithms
- National Security Agency: Type 1 Algorithms
- National Security Agency: Type 2 Algorithms
- National Security Agency: Type 3 Algorithms
- National Security Agency: Type 4 Algorithms
- Unbreakable Encryption
Cryptanalysis
- Breaking Ciphers
- Cryptanalysis
- Frequency Analysis
- Kasiski
- Cracking Modern Cryptography
- Cracking Modern Cryptography: Chosen Plaintext Attack
- Cracking Modern Cryptography: Ciphertext-only and Related-key Attack
- Linear Cryptanalysis
- Differential Cryptanalysis
- Integral Cryptanalysis
- Cryptanalysis Resources
- Cryptanalysis Success
- Rainbow Tables
- Password Cracking
- Tools
Introduction and History of Cryptography
- What is Cryptography?
- History of Cryptography
- Mono-Alphabet Substitution
- Caesar Cipher
- Atbash Cipher
- Affine Cipher
- ROT13 Cipher
- Scytale
- Single Substitution Weaknesses
- Multi-Alphabet Substitution
- Cipher Disk
- Vigenère Cipher
- Vigenère Cipher: Example
- Breaking the Vigenère Cipher
- Playfair Cipher
- ADFGVX Cipher
- Homophonic Substitution
- Null Ciphers
- Book Ciphers
- Rail Fence Ciphers
- The Enigma Machine
- CrypTool
Symmetric Cryptography & Hashes
- Symmetric Cryptography
- Information Theory
- Information Theory Cryptography Concepts
- Kerckhoffs’s Principle
- Substitution
- Transposition
- Binary Math
- Binary AND
- Binary OR
- Binary XOR
- Block Cipher vs. Stream Cipher
- Symmetric Block Cipher Algorithms
- Basic Facts of the Feistel Function
- The Feistel Function
- Unbalanced Feistel Cipher
- Data Encryption Standard (DES)
- 3DES
- DESx
- Whitening
- Advanced Encryption Standard (AES)
- AES General Overview
- AES Specifics
- Blowfish
- Serpent
- Twofish
- Skipjack
- International Data Encryption Algorithm (IDEA)
- CAST
- Tiny Encryption Algorithm (TEA)
- SHARK
- Basic Facts of the Feistel Function
- Symmetric Algorithm Methods
- Electronic Codebook (ECB)
- Cipher-Block Chaining (CBC)
- Propagating Cipher-Block Chaining (PCBC)
- Cipher Feedback (CFB)
- Output Feedback (OFB)
- Counter (CTR)
- Initialization Vector (IV)
- Symmetric Stream Ciphers
- Example of Symmetric Stream Ciphers: RC4
- Example of Symmetric Stream Ciphers: FISH
- Example of Symmetric Stream Ciphers: PIKE
- Hash Function
- Hash – Salt
- MD5
- The MD5 Algorithm
- MD6
- Secure Hash Algorithm (SHA)
- FORK-256
- RIPEMD-160
- GOST
- Tiger
- MAC and HMAC
- CryptoBench
Number Theory and Asymmetric Cryptography
- Asymmetric Encryption
- Basic Number Facts
- Prime Numbers
- Co-Prime Numbers
- Euler’s Totient
- Modulus Operator
- Fibonacci Numbers
- Birthday Theorem
- Birthday Paradox
- Birthday Paradox: Probability
- Birthday Attack
- Birthday Paradox
- Random Number Generator
- Classification of Random Number Generator
- Traits of a Good PRNG
- Naor-Reingold and Mersenne Twister Pseudorandom Function
- Linear Congruential Generator
- Lehmer Random Number Generator
- Lagged Fibonacci Generator (LFG)
- Blum Blum Shub
- Yarrow
- Fortuna
- Diffie-Hellman
- Rivest Shamir Adleman (RSA)
- RSA – How it Works
- RSA Example
- Menezes–Qu–Vanstone
- Digital Signature Algorithm
- Signing with DSA
- Elliptic Curve
- Elliptic Curve Variations
- Elgamal
- CrypTool
Applications of Cryptography
- FIPS Standards
- Digital Signatures
- What is a Digital Certificate?
- Digital Certificates
- X.509
- X.509 Certificates
- X.509 Certificate Content
- X.509 Certificate File Extensions
- Digital Certificates
- Certificate Authority (CA)
- Certificate Authority – Verisign
- Registration Authority (RA)
- Public Key Infrastructure (PKI)
- Digital Certificate Terminology
- Server-based Certificate Validation Protocol
- Digital Certificate Management
- Trust Models
- Certificates and Web Servers
- Microsoft Certificate Services
- Windows Certificates: certmgr.msc
- Authentication
- Password Authentication Protocol (PAP)
- Shiva Password Authentication Protocol (S-PAP)
- Challenge-Handshake Authentication Protocol (CHAP)
- Kerberos
- Components of Kerberos System
- Kerberos Authentication Process
- Pretty Good Privacy (PGP)
- PGP Certificates
- Wi-Fi Encryption
- Wired Equivalent Privacy (WEP)
- WPA – Wi-Fi Protected Access
- WPA2
- SSL
- TLS
- Virtual Private Network (VPN)
- Point-to-Point Tunneling Protocol (PPTP)
- PPTP VPN
- Layer 2 Tunneling Protocol VPN
- Internet Protocol Security VPN
- SSL/TLS VPN
- Point-to-Point Tunneling Protocol (PPTP)
- Encrypting Files
- Backing up the EFS key
- Restoring the EFS Key
- BitLocker
- BitLocker: Screenshot
- Disk Encryption Software: VeraCrypt
- Common Cryptography Mistakes
- Steganography
- Steganography Terms
- Historical Steganography
- Steganography Details
- Other Forms of Steganography
- How to Embed?
- Steganographic File Systems
- Steganography Implementations
- Demonstration
- Steganalysis
- Steganalysis – Raw Quick Pair
- Steganalysis – Chi-Square Analysis
- Steganalysis – Audio Steganalysis
- Steganography Detection Tools
- National Security Agency and Cryptography
- NSA Suite A Encryption Algorithms
- NSA Suite B Encryption Algorithms
- National Security Agency: Type 1 Algorithms
- National Security Agency: Type 2 Algorithms
- National Security Agency: Type 3 Algorithms
- National Security Agency: Type 4 Algorithms
- Unbreakable Encryption
Cryptanalysis
- Breaking Ciphers
- Cryptanalysis
- Frequency Analysis
- Kasiski
- Cracking Modern Cryptography
- Cracking Modern Cryptography: Chosen Plaintext Attack
- Cracking Modern Cryptography: Ciphertext-only and Related-key Attack
- Linear Cryptanalysis
- Differential Cryptanalysis
- Integral Cryptanalysis
- Cryptanalysis Resources
- Cryptanalysis Success
- Rainbow Tables
- Password Cracking
- Tools
Nosso Instrutor

Thiago Muniz
Obtenha o treinamento ECES da EC-Council
A plataforma de entrega oficial do ECES no Brasil é a Acadi-TI e inclui material de estudo, laboratórios virtuais e oferece as opções mais flexíveis de treinamento para se adequar à sua agenda.