Cybersecurity
Fundamentals
CSCU & ECES Exam Prep
About the Program
Soar to new Heights with this introduction to cyber security! The purpose of the Certified Secure Computer User (CSCU) training program is to provide students with the necessary knowledge and skills to protect their information assets. This class will immerse students into an interactive environment where they will acquire a fundamental understanding of various computer and network security threats such as identity theft, credit card fraud, online banking phishing scams, virus and backdoors, emails hoaxes, sex offenders lurking online, loss of confidential information, hacking attacks and social engineering. More importantly, the skills learned from the class helps students take the necessary steps to mitigate their security exposure.
The EC-Council Certified Encryption Specialist (ECES) program introduces professionals and students to the field of cryptography. The participants will learn the foundations of modern symmetric and key cryptography including the details of algorithms such as Feistel Networks, DES, and AES.
Participants will also be provided a practical application of the following:
How to set up a VPN
Encrypt a drive
Hands-on experience with steganography
Hands on experience in cryptographic algorithms ranging from classic ciphers like Caesar cipher to modern day algorithms such as AES and RSA.
Tuition & Program Info
To learn more about ETI’s tuition and financial aid options, click here.
$1,796
Package Includes:
Certified Secure Computer User (CSCU)
Instructor led training modules (1 year access)
Official e-courseware (1 year access)
Exam Voucher
CSCU Textbook (Ships to US, Canada and Australia ONLY)
CodeRed 12 month Subscription (with 4000+ Premium Video)
Certified Encryption Specialist (ECES)
Instructor led training modules (1 year access)
Official e-courseware (1 year access)
iLabs (6 Months Access)
Exam Voucher
ECES Textbook (Ships to US, Canada and Australia ONLY)
Course Outline
Certified Secure Computer User (CSCU)
This certification is an excellent complement to educational offerings in the domain of security and networking.
Educational institutions can provide greater value to students by providing them not only with one of the most updated courseware available today but with a certification that empowers their students in the corporate world. The courseware comes complete with labs and exercises to allow the student to gain actual skills.
-
Data–Digital Building Blocks
Importance of Data in the Information Age
Threats to Data
Data Security
Potential Losses Due to Security Attacks
Implementing Security
-
Guidelines To Secure Windows
Guidelines To Secure Mac OS X
-
What is Malware
Types Of Malware
Symptoms Of Malware Infection
Antivirus
Configuring and Using Antivirus Software
How To Test If an Antivirus is Working
-
Understanding Web Browser Concepts
Understanding IM Security
Understanding Child Online Safety
-
Understanding Social Networking Concepts
Understanding Various Social Networking Security Threats
Understanding Facebook Security Settings
Understanding Twitter Security Settings
-
Understanding Email Security Concepts
Understanding Various Email Security Threats
Understanding Various Email Security Procedures
-
Understanding Mobile Device Security Concepts
Understanding Threats To a Mobile Device
Understanding Various Mobile Security Procedures
Understanding How to Secure iPhone and iPad Devices
Understanding How to Secure Android Devices
Understanding How to Secure Windows Device
Mobile Security Tools
-
The Concept of Cloud
How Cloud Works
Threats To Cloud Security
Safeguarding Against Cloud Security Threats
Cloud Privacy Issues
Addressing Cloud Privacy Issues
Choosing a Cloud Service Provider
-
Understanding Various Networking Concepts
Understanding Setting Up a Wireless Network in Windows
Understanding Setting Up a Wireless Network in Mac
Understanding Threats to Wireless Network Security and Countermeasures
Measures to Secure Network Connections
-
Data Backup Concepts
Types of Data Backups
Windows Backup and Restore Procedures
MAC OS X Backup and Restore Procedures
Understanding Secure Data Destruction
-
Exam Name: CSCU (112-12) Exam
Credit Towards Certification: Secure Computer User Specialist (CSCU)
Number of Questions: 50
Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery: EC-Council Exam Portal
Certified Encryption Specialist (ECES)
Anyone involved in the selection and implementation of VPN’s or digital certificates should attend this course. Without understanding the cryptography at some depth, people are limited to following marketing hype. Understanding the actual cryptography allows you to know which one to select. A person successfully completing this course will be able to select the encryption standard that is most beneficial to their organization and understand how to effectively deploy that technology.
This course is excellent for ethical hackers and penetration testing professionals as most penetration testing courses skip cryptanalysis completely. Many penetration testing professionals testing usually don’t attempt to crack cryptography. Basic knowledge of cryptanalysis is very beneficial to any penetration testing.
-
What is Cryptography?
History
Mono-Alphabet Substitution
Caesar Cipher
Atbash Cipher
ROT 13
Scytale
Single Substitution Weaknesses
Multi-Alphabet Substitution
Cipher Disk
Vigenère Cipher
Vigenère Cipher: Example
Breaking the Vigenère Cipher
Playfair
The ADFGVX cipher
The Enigma Machine
CrypTool
-
Symmetric Cryptography
Information Theory
Information Theory Cryptography Concepts
Kerckhoffs’s Principle
Substitution
Transposition
Substitution and Transposition
Binary Math
Binary AND
Binary OR
Binary XOR
Block Cipher vs. Stream Cipher
Symmetric Block Cipher Algorithms
Basic Facts of the Feistel Function
The Feistel Function
A Simple View of a Single Round
Unbalanced Feistel Cipher
DES
3DES
DESx
Whitening
AES
AES General Overview
AES Specifics
Blowfish
Serpent
Twofish
Skipjack
IDEA
Symmetric Algorithm Methods
Electronic Codebook (ECB)
Cipher-Block Chaining (CBC)
Propagating Cipher-Block Chaining (PCBC)
Cipher Feedback (CFB)
Output Feedback (OFB)
Counter (CTR)
Initialization Vector (IV)
Symmetric Stream Ciphers
Example of Symmetric Stream Ciphers: RC4
Example of Symmetric Stream Ciphers: FISH
Example of Symmetric Stream Ciphers: PIKE
Hash
Hash – Salt
MD5
The MD5 Algorithm
MD6
Secure Hash Algorithm (SHA)
Fork 256
RIPEMD – 160
GOST
Tiger
CryptoBench
-
Asymmetric Encryption
Basic Number Facts
Prime Numbers
Co-Prime
Eulers Totient
Modulus Operator
Fibonacci Numbers
Birthday Problem
Birthday Theorem
Birthday Attack
Random Number Generators
Classification of Random Number Generators
Naor-Reingold and Mersenne Twister Pseudorandom Function
Linear Congruential Generator
Lehmer Random Number Generator
Lagged Fibonacci Generator
Diffie-Hellman
Rivest Shamir Adleman (RSA)
RSA – How it Works
RSA Example
Menezes–Qu–Vanstone
Digital Signature Algorithm
Signing with DSA
Elliptic Curve
Elliptic Curve Variations
Elgamal
CrypTool
-
Digital Signatures
What is a Digital Certificate?
Digital Certificates
X.509
X.509 Certificates
X.509 Certificate Content
X.509 Certificate File Extensions
Certificate Authority (CA)
Registration Authority (RA)
Public Key Infrastructure (PKI)
Digital Certificate Terminology
Server-based Certificate Validation Protocol
Digital Certificate Management
Trust Models
Certificates and Web Servers
Microsoft Certificate Services
Windows Certificates: certmgr.msc
Authentication
Password Authentication Protocol (PAP)
Shiva Password Authentication Protocol (S-PAP)
Challenge-Handshake Authentication Protocol (CHAP)
Kerberos
Components of Kerberos System
Pretty Good Privacy (PGP)
PGP Certificates
Wifi Encryption
Wired Equivalent Privacy (WEP)
WPA – Wi-Fi Protected Access
WPA2
SSL
TLS
Virtual Private Network (VPN)
Point-to-Point Tunneling Protocol (PPTP)
PPTP VPN
Layer 2 Tunneling Protocol VPN
Internet Protocol Security VPN
SSL/VPN
Encrypting Files
Backing up the EFS key
Restoring the EFS Key
Bitlocker
Bitlocker: Screenshot
Disk Encryption Software: Truecrypt
Steganography
Steganography Terms
Historical Steganography
Steganography Details
Other Forms of Steganography
Steganography Implementations
Demonstration
Steganalysis
Steganalysis – Raw Quick Pair
Steganalysis – Chi-Square Analysis
Steganalysis – Audio Steganalysis
Steganography Detection Tools
National Security Agency and Cryptography
NSA Suite A Encryption Algorithms
NSA Suite B Encryption Algorithms
National Security Agency: Type 1 Algorithms
National Security Agency: Type 2 Algorithms
National Security Agency: Type 3 Algorithms
National Security Agency: Type 4 Algorithms
Unbreakable Encryption
-
Breaking Ciphers
Cryptanalysis
Frequency Analysis
Kasiski
Cracking Modern Cryptography
Cracking Modern Cryptography: Chosen Plaintext Attack
Linear Cryptanalysis
Differential Cryptanalysis
Integral Cryptanalysis
Cryptanalysis Resources
Cryptanalysis Success
Rainbow Tables
Password Cracking
Tools
-
Number of Questions: 50
Required Passing Score: 70%
Test Duration: 2 Hours
Test Format: Multiple Choice
Test Delivery: EC-Council Exam Center (ECC EXAM)