Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/siberguvenliktek/public_html/wp-content/plugins/revslider/includes/operations.class.php on line 2854

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/siberguvenliktek/public_html/wp-content/plugins/revslider/includes/operations.class.php on line 2858

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/siberguvenliktek/public_html/wp-content/plugins/revslider/includes/output.class.php on line 3708

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/siberguvenliktek/public_html/wp-content/plugins/woocommerce/includes/wc-formatting-functions.php on line 776

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/siberguvenliktek/public_html/wp-content/plugins/woocommerce/includes/wc-formatting-functions.php on line 776

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/siberguvenliktek/public_html/wp-content/plugins/woocommerce/includes/wc-formatting-functions.php on line 777

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/siberguvenliktek/public_html/wp-content/plugins/woocommerce/includes/wc-formatting-functions.php on line 777

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/siberguvenliktek/public_html/wp-content/plugins/woocommerce/includes/wc-formatting-functions.php on line 778

Deprecated: Array and string offset access syntax with curly braces is deprecated in /home/siberguvenliktek/public_html/wp-content/plugins/woocommerce/includes/wc-formatting-functions.php on line 778
EC-COUNCIL CERTIFIED ENCRYPTION SPECIALIST (ECES) SİBER GÜVENLİK EĞİTİMİ - Siber Güvenlikte Kariyer
  •  Pzts - Cuma / 9.00 - 17.00
  • Bodrum / Türkiye
  •  0 (252) 386 45 10

EC-COUNCIL CERTIFIED ENCRYPTION SPECIALIST (ECES)
EC-COUNCIL SERTİFİKALI KRİPTOLOJİ UZMANI (ECES)

SERTİFİKASYONU EĞİTİMİ

divider

EC-Council Certified Encryption Specialist ECES

EC-Council Sertifikalı Kriptoloji Uzmanı – ECES

EC-Council Sertifikalı Kriptoloji Uzmanı programı, siber güvenlik profesyonellerini ve öğrencileri kriptografi bilimi ile tanıştırıyor. Katılımcılar modern simetrik ve anahtar şifrelemenin temellerini görecekler, Feistel Networks, DES ve AES gibi algoritimleri anlayacaklardır. Bunların dışında;

  • Blowfish, Twofish ve Skipjack gibi algoritmalarını tanıyacaklar
  • MD5, MD6, SHA, Gost, RIPMD 256 ve birçok hashing mekanizmalarını öğrenecekler
  • RSA, Elgamal, Elliptic Curve, DSA gibi Asimetrik kriptografik teknikleri tanıyacaklar
  • Diffusion, Confusion ve Kerkchoff prensipleri konseptlerini öğrenecekler

Eğitimde katılımcılar yukarıdakilere ek olarak aşağıdaki pratik konularını görecekler

  • VPN nedir, nasıl kurulur
  • Sürücülerin şifrelenmesi
  • Steganography ile pratik yapma
  • Caesar cipher şifrelemesinden AES ve RSA e kadar farklı kriptografi algoritmaları ile çalışma

Kimler Katılmalı

VPN ve Dijital Sertifikalar ile çalışan kurumlardaki BT Personeli. Kriptografik teknikleri bilmeden ve anlamadan güvenli bağlantıların sağlanması ezberden öteye gitmeyecektir. Bu kurs ile Kriptografik teknikeri anlamlandırıp kurumunuzda etkin kullanımını gerçekleştirebilirsiniz.

Ek olarak bu kurs Etik Hackerlar ve Penetrasyon Testi Profesyonelleri için kriptografi, kriptoloji ve şifreleme metodlarının anlaşılması için tamamlayıcı bir eğitimdir. Birçok sızma testi uzmanı kriptografik şifreleme üzerinde çalışamaz. Bu eğitim programı ile kriptografik tekniklerinizi geliştirebileceksiniz.

ECES - Certified Encryption Specialist

NELER ÖĞRENECEKSİNİZ

  • Şifreleme Standartları ve aralarındaki farklar
  • En iyi standartın ve yöntemin şirketinizin için seçilmesi
  • Sızma Testi aşamalarında şifreleme ve kriptografik bilginizin geliştirilmesi
  • Doğru ve Yanlış Kriptografik Teknik uygulamaları
  • Şifrelemelerde yapılan hatalar ve yanlış uygulamalar
  • Kriptografik tekniklerin en iyi uygulamaları

Sınav Hakkında

Soru Sayısı: 50
Sınav Süresi: 2 Saat
Başarı Puanı: %70
Sınav Formatı: Çoktan Seçmeli
Sınav Yeri: ECC EXAM

EC-Council Sertifikalı Kriptoloji Uzmanı Eğitim Detayları

Introduction and History of Cryptography

  • What is Cryptography?
  • History of Cryptography
  • Mono-Alphabet Substitution
    • Caesar Cipher
    • Atbash Cipher
    • Affine Cipher
    • ROT13 Cipher
    • Scytale
    • Single Substitution Weaknesses
  • Multi-Alphabet Substitution
    • Cipher Disk
    • Vigenère Cipher
      • Vigenère Cipher: Example
      • Breaking the Vigenère Cipher
    • Playfair Cipher
    • ADFGVX Cipher
  • Homophonic Substitution
  • Null Ciphers
  • Book Ciphers
  • Rail Fence Ciphers
  • The Enigma Machine
  • CrypTool

Symmetric Cryptography & Hashes

  • Symmetric Cryptography
  • Information Theory
    • Information Theory Cryptography Concepts
  • Kerckhoffs’s Principle
  • Substitution
  • Transposition
  • Binary Math
    • Binary AND
    • Binary OR
    • Binary XOR
  • Block Cipher vs. Stream Cipher
  • Symmetric Block Cipher Algorithms
    • Basic Facts of the Feistel Function
      • The Feistel Function
      • Unbalanced Feistel Cipher
    • Data Encryption Standard (DES)
    • 3DES
      • DESx
      • Whitening
    • Advanced Encryption Standard (AES)
      • AES General Overview
      • AES Specifics
    • Blowfish
    • Serpent
    • Twofish
    • Skipjack
    • International Data Encryption Algorithm (IDEA)
    • CAST
    • Tiny Encryption Algorithm (TEA)
    • SHARK
  • Symmetric Algorithm Methods
    • Electronic Codebook (ECB)
    • Cipher-Block Chaining (CBC)
    • Propagating Cipher-Block Chaining (PCBC)
    • Cipher Feedback (CFB)
    • Output Feedback (OFB)
    • Counter (CTR)
    • Initialization Vector (IV)
  • Symmetric Stream Ciphers
    • Example of Symmetric Stream Ciphers: RC4
    • Example of Symmetric Stream Ciphers: FISH
    • Example of Symmetric Stream Ciphers: PIKE
  • Hash Function
    • Hash – Salt
    • MD5
      • The MD5 Algorithm
    • MD6
    • Secure Hash Algorithm (SHA)
    • FORK-256
    • RIPEMD-160
    • GOST
    • Tiger
    • MAC and HMAC
  • CryptoBench

Number Theory and Asymmetric Cryptography

  • Asymmetric Encryption
  • Basic Number Facts
    • Prime Numbers
    • Co-Prime Numbers
    • Euler’s Totient
    • Modulus Operator
    • Fibonacci Numbers
  • Birthday Theorem
    • Birthday Paradox
      • Birthday Paradox: Probability
    • Birthday Attack
  • Random Number Generator
    • Classification of Random Number Generator
    • Traits of a Good PRNG
    • Naor-Reingold and Mersenne Twister Pseudorandom Function
    • Linear Congruential Generator
    • Lehmer Random Number Generator
    • Lagged Fibonacci Generator (LFG)
    • Blum Blum Shub
    • Yarrow
    • Fortuna
  • Diffie-Hellman
  • Rivest Shamir Adleman (RSA)
    • RSA – How it Works
    • RSA Example
  • Menezes–Qu–Vanstone
  • Digital Signature Algorithm
    • Signing with DSA
  • Elliptic Curve
    • Elliptic Curve Variations
  • Elgamal
  • CrypTool

Applications of Cryptography

  • FIPS Standards
  • Digital Signatures
  • What is a Digital Certificate?
    • Digital Certificates
      • X.509
      • X.509 Certificates
      • X.509 Certificate Content
      • X.509 Certificate File Extensions
  • Certificate Authority (CA)
    • Certificate Authority – Verisign
  • Registration Authority (RA)
  • Public Key Infrastructure (PKI)
  • Digital Certificate Terminology
  • Server-based Certificate Validation Protocol
  • Digital Certificate Management
  • Trust Models
  • Certificates and Web Servers
  • Microsoft Certificate Services
  • Windows Certificates: certmgr.msc
  • Authentication
    • Password Authentication Protocol (PAP)
    • Shiva Password Authentication Protocol (S-PAP)
    • Challenge-Handshake Authentication Protocol (CHAP)
    • Kerberos
      • Components of Kerberos System
      • Kerberos Authentication Process
  • Pretty Good Privacy (PGP)
    • PGP Certificates
  • Wi-Fi Encryption
    • Wired Equivalent Privacy (WEP)
    • WPA – Wi-Fi Protected Access
    • WPA2
  • SSL
  • TLS
  • Virtual Private Network (VPN)
    • Point-to-Point Tunneling Protocol (PPTP)
      • PPTP VPN
    • Layer 2 Tunneling Protocol VPN
    • Internet Protocol Security VPN
    • SSL/TLS VPN
  • Encrypting Files
    • Backing up the EFS key
    • Restoring the EFS Key
  • BitLocker
    • BitLocker: Screenshot
  • Disk Encryption Software: VeraCrypt
  • Common Cryptography Mistakes
  • Steganography
    • Steganography Terms
    • Historical Steganography
    • Steganography Details
    • Other Forms of Steganography
    • How to Embed?
    • Steganographic File Systems
    • Steganography Implementations
    • Demonstration
  • Steganalysis
    • Steganalysis – Raw Quick Pair
    • Steganalysis – Chi-Square Analysis
    • Steganalysis – Audio Steganalysis
  • Steganography Detection Tools
  • National Security Agency and Cryptography
    • NSA Suite A Encryption Algorithms
    • NSA Suite B Encryption Algorithms
    • National Security Agency: Type 1 Algorithms
    • National Security Agency: Type 2 Algorithms
    • National Security Agency: Type 3 Algorithms
    • National Security Agency: Type 4 Algorithms
  • Unbreakable Encryption

Cryptanalysis

  • Breaking Ciphers
  • Cryptanalysis
  • Frequency Analysis
  • Kasiski
  • Cracking Modern Cryptography
    • Cracking Modern Cryptography: Chosen Plaintext Attack
    • Cracking Modern Cryptography: Ciphertext-only and Related-key Attack
  • Linear Cryptanalysis
  • Differential Cryptanalysis
  • Integral Cryptanalysis
  • Cryptanalysis Resources
  • Cryptanalysis Success
  • Rainbow Tables
  • Password Cracking
  • Tools