EC-Council Certified
Encryption Specialist (ECES) v2

Course Description

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Functions, DES, and AES. ECES provides necessary skills to perform effective deployment of encryption technologies. It is a comprehensive course covering various algorithms, the key concepts behind those algorithms, applications of the cryptography in various ways and performing cryptanalysis.

Why Do We Need ECES?

Understanding the cryptography allows you to make informed choices

A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology

Without understanding  he cryptography at some depth, people are limited to only marketing hype of information security solutions

•  Knowledge of cryptanalysis is very beneficial for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely.

No prior knowledge of cryptography is assumed, and no mathematical skills beyond basic algebra are required.

Penetration Testers and Computer Forensics Specialists

Cloud Security architects, designers, and developers

Anyone involved in selecting and implementing VPNs or digital certificates, Information Security Operations

Anyone involved in developing Operating Systems, Cryptography Systems, Blockchain based solutions, etc.

3 days / 20 hours
(9:00 AM to 4:00 PM)

The EC-Council Certified Encryption Specialist (ECES) may be taken on the last day of training (optional). Students need to pass the online exam to receive ECES certification.

Exam Title: EC-Council Certified Encryption Specialist

Exam Code: 212-81

Number of Questions: 50

Duration: 2 hours

Exam Availability: EC-Council Exam Portal

Test Format: Multiple Choice

Passing Score: 70%

Information about the course

What will you learn?

  • Types of encryption standards and their differences
  • How to select the best standard for your organization?
  • How to enhance your pen-testing knowledge in encryption?
  • Correct and incorrect deployment of encryption technologies
  • Common mistakes made in implementing encryption technologies
  • Best practices when implementing encryption technologies


  • Develop skills to protect critical data in organizations with encryption
  • Develop a deep understanding of essential cryptography algorithms and their applications
  • Make informed decisions about applying encryption technologies
  • Save time and cost by avoiding common mistakes in implementing encryption technologies effectively
  • Develop working knowledge of cryptanalysis

Course Outline

  • Module 01
    Introduction and History of Cryptography
  • Module 02
    Symmetric Cryptography and Hashes
  • Module 03
    Number Theory and Asymmetric Cryptography
  • Module 04
    Applications of Cryptography
  • Module 05

Advantages of the course

  • Without understanding the cryptography at some depth, people are limited to only marketing hype of information security solutions
  • The course will provide students experience working with cryptographic algorithms and practical knowledge of how to set up a VPN, encrypt a drive, and hands‐on experience with steganography
  • A person successfully completing this course would have at least a basic knowledge of cryptanalysis which will help him in any penetration testing

Contact us!