• Classroom
  • Online, Instructor-Led
Course Description

The ECES course introduces students to modern symmetric key cryptography including the details of algorithms such as Feistel Networks, DES, and AES as well as an overview of many other algorithms such as Blowfish, Twofish, Skipjack, and others. Other topic areas include the basics of information theory as it applies to cryptography; an introduction to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others; asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA; significant concepts such as diffusion, confusion, and Kerkcho's principle.

Learning Objectives

The basics of information theory as it applies to cryptography; An introduction to hashing algorithms including MD5, MD6, SHA, Gost, RIPMD 256 and others; Asymmetric cryptography including thorough descriptions of RSA, Elgamal, Elliptic Curve, and DSA; Significant concepts such as diffusion, confusion, and Kerkcho's principle; Types of encryption standards and their differences; How to select the best standard for your organization; How to enhance your pen-testing knowledge in encryption; Correct and incorrect deployment of encryption technologies; Common mistakes made in implementing encryption technologies; Best practices when implementing encryption technologies

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.