Cybersecurity
Fundamentals

CSCU & ECES Exam Prep

 

About the Program

Soar to new Heights with this introduction to cyber security! The purpose of the Certified Secure Computer User (CSCU) training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.

The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES.

Participants will also be provided a practical application of the following:

  • How to set up a VPN

  • Encrypt a drive

  • Hands-on experience with steganography

  • Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.


Tuition & Program Info

To learn more about ETI’s tuition and financial aid options, click here.

$1,796

Package Includes:

Certified Secure Computer User (CSCU)

  • Instructor led training modules (1 year access)

  • Official e-courseware (1 year access)

  • Exam Voucher

  • CSCU Textbook (Ships to US, Canada and Australia ONLY)

  • CodeRed 12 month Subscription (with 4000+ Premium Video)

Certified Encryption Specialist (ECES)

  • Instructor led training modules (1 year access)

  • Official e-courseware (1 year access)

  • iLabs (6 Months Access)

  • Exam Voucher

  • ECES Textbook (Ships to US, Canada and Australia ONLY)


Course Outline

Certified Secure Computer User (CSCU)

This certification is an excellent complement to educational offerings in the domain of security and networking.

Educational institutions can provide greater value to students by providing them not only with one of the most updated courseware available today but with a certification that empowers their students in the corporate world. The courseware comes complete with labs and exercises to allow the student to gain actual skills.

    • Data–Digital Building Blocks

    • Importance of Data in the Information Age

    • Threats to Data

    • Data Security

    • Potential Losses Due to Security Attacks

    • Implementing Security

    • Guidelines To Secure Windows

    • Guidelines To Secure Mac OS X

    • What is Malware

    • Types Of Malware

    • Symptoms Of Malware Infection

    • Antivirus

    • Configuring and Using Antivirus Software

    • How To Test If an Antivirus is Working

    • Understanding Web Browser Concepts

    • Understanding IM Security

    • Understanding Child Online Safety

    • Understanding Social Networking Concepts

    • Understanding Various Social Networking Security Threats

    • Understanding Facebook Security Settings

    • Understanding Twitter Security Settings

    • Understanding Email Security Concepts

    • Understanding Various Email Security Threats

    • Understanding Various Email Security Procedures

    • Understanding Mobile Device Security Concepts

    • Understanding Threats To a Mobile Device

    • Understanding Various Mobile Security Procedures

    • Understanding How to Secure iPhone and iPad Devices

    • Understanding How to Secure Android Devices

    • Understanding How to Secure Windows Device

    • Mobile Security Tools

    • The Concept of Cloud

    • How Cloud Works

    • Threats To Cloud Security

    • Safeguarding Against Cloud Security Threats

    • Cloud Privacy Issues

    • Addressing Cloud Privacy Issues

    • Choosing a Cloud Service Provider

    • Understanding Various Networking Concepts

    • Understanding Setting Up a Wireless Network in Windows

    • Understanding Setting Up a Wireless Network in Mac

    • Understanding Threats to Wireless Network Security and Countermeasures

    • Measures to Secure Network Connections

    • Data Backup Concepts

    • Types of Data Backups

    • Windows Backup and Restore Procedures

    • MAC OS X Backup and Restore Procedures

    • Understanding Secure Data Destruction

    • Exam Name: CSCU (112-12) Exam

    • Credit Towards Certification: Secure Computer User Specialist (CSCU)

    • Number of Questions: 50

    • Passing Score: 70%

    • Test Duration: 2 Hours

    • Test Format: Multiple Choice

    • Test Delivery: EC-Council Exam Portal

 

Certified Encryption Specialist (ECES)

Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.

This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. Basic knowledge of cryptanalysis is very beneficial to any penetration testing.

    • What is Cryptography?

    • History

    • Mono-Alphabet Substitution

    • Caesar Cipher

    • Atbash Cipher

    • ROT 13

    • Scytale

    • Single Substitution Weaknesses

    • Multi-Alphabet Substitution

    • Cipher Disk

    • Vigenère Cipher

    • Vigenère Cipher: Example

    • Breaking the Vigenère Cipher

    • Playfair

    • The ADFGVX cipher

    • The Enigma Machine

    • CrypTool

    • Symmetric Cryptography

    • Information Theory

    • Information Theory Cryptography Concepts

    • Kerckhoffs’s Principle

    • Substitution

    • Transposition

    • Substitution and Transposition

    • Binary Math

    • Binary AND

    • Binary OR

    • Binary XOR

    • Block Cipher vs. Stream Cipher

    • Symmetric Block Cipher Algorithms

    • Basic Facts of the Feistel Function

    • The Feistel Function

    • A Simple View of a Single Round

    • Unbalanced Feistel Cipher

    • DES

    • 3DES

    • DESx

    • Whitening

    • AES

    • AES General Overview

    • AES Specifics

    • Blowfish

    • Serpent

    • Twofish

    • Skipjack

    • IDEA

    • Symmetric Algorithm Methods

    • Electronic Codebook (ECB)

    • Cipher-Block Chaining (CBC)

    • Propagating Cipher-Block Chaining (PCBC)

    • Cipher Feedback (CFB)

    • Output Feedback (OFB)

    • Counter (CTR)

    • Initialization Vector (IV)

    • Symmetric Stream Ciphers

    • Example of Symmetric Stream Ciphers: RC4

    • Example of Symmetric Stream Ciphers: FISH

    • Example of Symmetric Stream Ciphers: PIKE

    • Hash

    • Hash – Salt

    • MD5

    • The MD5 Algorithm

    • MD6

    • Secure Hash Algorithm (SHA)

    • Fork 256

    • RIPEMD – 160

    • GOST

    • Tiger

    • CryptoBench

    • Asymmetric Encryption

    • Basic Number Facts

    • Prime Numbers

    • Co-Prime

    • Eulers Totient

    • Modulus Operator

    • Fibonacci Numbers

    • Birthday Problem

    • Birthday Theorem

    • Birthday Attack

    • Random Number Generators

    • Classification of Random Number Generators

    • Naor-Reingold and Mersenne Twister Pseudorandom Function

    • Linear Congruential Generator

    • Lehmer Random Number Generator

    • Lagged Fibonacci Generator

    • Diffie-Hellman

    • Rivest Shamir Adleman (RSA)

    • RSA – How it Works

    • RSA Example

    • Menezes–Qu–Vanstone

    • Digital Signature Algorithm

    • Signing with DSA

    • Elliptic Curve

    • Elliptic Curve Variations

    • Elgamal

    • CrypTool

    • Digital Signatures

    • What is a Digital Certificate?

    • Digital Certificates

    • X.509

    • X.509 Certificates

    • X.509 Certificate Content

    • X.509 Certificate File Extensions

    • Certificate Authority (CA)

    • Registration Authority (RA)

    • Public Key Infrastructure (PKI)

    • Digital Certificate Terminology

    • Server-based Certificate Validation Protocol

    • Digital Certificate Management

    • Trust Models

    • Certificates and Web Servers

    • Microsoft Certificate Services

    • Windows Certificates: certmgr.msc

    • Authentication

    • Password Authentication Protocol (PAP)

    • Shiva Password Authentication Protocol (S-PAP)

    • Challenge-Handshake Authentication Protocol (CHAP)

    • Kerberos

    • Components of Kerberos System

    • Pretty Good Privacy (PGP)

    • PGP Certificates

    • Wifi Encryption

    • Wired Equivalent Privacy (WEP)

    • WPA – Wi-Fi Protected Access

    • WPA2

    • SSL

    • TLS

    • Virtual Private Network (VPN)

    • Point-to-Point Tunneling Protocol (PPTP)

    • PPTP VPN

    • Layer 2 Tunneling Protocol VPN

    • Internet Protocol Security VPN

    • SSL/VPN

    • Encrypting Files

    • Backing up the EFS key

    • Restoring the EFS Key

    • Bitlocker

    • Bitlocker: Screenshot

    • Disk Encryption Software: Truecrypt

    • Steganography

    • Steganography Terms

    • Historical Steganography

    • Steganography Details

    • Other Forms of Steganography

    • Steganography Implementations

    • Demonstration

    • Steganalysis

    • Steganalysis – Raw Quick Pair

    • Steganalysis – Chi-Square Analysis

    • Steganalysis – Audio Steganalysis

    • Steganography Detection Tools

    • National Security Agency and Cryptography

    • NSA Suite A Encryption Algorithms

    • NSA Suite B Encryption Algorithms

    • National Security Agency: Type 1 Algorithms

    • National Security Agency: Type 2 Algorithms

    • National Security Agency: Type 3 Algorithms

    • National Security Agency: Type 4 Algorithms

    • Unbreakable Encryption

    • Breaking Ciphers

    • Cryptanalysis

    • Frequency Analysis

    • Kasiski

    • Cracking Modern Cryptography

    • Cracking Modern Cryptography: Chosen Plaintext Attack

    • Linear Cryptanalysis

    • Differential Cryptanalysis

    • Integral Cryptanalysis

    • Cryptanalysis Resources

    • Cryptanalysis Success

    • Rainbow Tables

    • Password Cracking

    • Tools

    • Number of Questions: 50

    • Required Passing Score: 70%

    • Test Duration: 2 Hours

    • Test Format: Multiple Choice

    • Test Delivery: EC-Council Exam Center (ECC EXAM)