With no addtional posts, I'm marking this as solved.
This is an interesting question that I'll try and get some more information from Don if he has a different take. This all has to do with symmetric encryption that is >64bit. These are pretty much controlled by the US government (e.g. AES and 3DES). So these are export restricted.
These symmetric encryptions that are < 64bit are not controlled by the US Government are exportable as long as the country is not on an embargo country ( Cuba , Iran , Myanmar, North Korea , Sudan, and Syria--today may include more).
So, here is the link for the Export Compliance.
The key here is that you may not dependent upon your country of origin be able to get any encryption higher than 64bit for your crypto even if you get a license that has crypto on it.
I just spoke with Don about this, If you're keen on using Cisco only what I posted above is correct. Don said many times though, you may be able to work with a retailer to get the exclusion to the restriction but not always. He also said that usually, what you may have to do though to provide you the crypto you need to is find hardware vendor (non-Cisco) that may not be US based to help you with your Crypto needs.
So my boss has put me in charge of our new pentesting division that he wants to launch in the future and he has told me to learn pentesting and to know it like the back of my hand and it is beginning to make some sense in that the methodology that the CEH course is teaching me is starting to make sense, but is there a generalized pentesting walkthrough that you guys or that someone else has that i can use to generalize my pentesting process and just help me understand how you take the recon and footprinting and use it to pentest and just help me make sense of it all because for someone stepping up to bat for the first time, it is a little intimidating
IT Service Managment