EHS: Secure Network Infrastructures

EHS Secure Network

Course Description

This certification covers a plethora of offensive security topics ranging from how perimeter defenses work to scanning and attacking the simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, a Certified Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.


Purchase EC-Council Certificate Series on Secure Network Infrastructures

Who should Attend

This course will significantly benefit the security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

  • Duration: 2 days (9:00AM – 5:00PM)
  • CPE/ECE Qualification:2 ECE Credits awarded for attendance (1 for each 8 hour class day)
  • Program Cost: $750 USD
  • Supplement Cost (Courseware & Certificate exam Access): $75 USD
  • Bundle Price: $799 USD
  • Getting Started: Find Training Click HERE
  • Corporate Trainers interested in setting up internal company training programs, click here



What’s included?

  • Physical Courseware
  • 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate

Related Certificates:

  • Ethical Hacking & Countermeasure Specialist: Attack Phases
  • Ethical Hacking and Countermeasures: Threats and Defense Mechanisms
  • Ethical Hacking and Countermeasures: Web Applications and Data Servers
  • Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems


Course Briefing

Hacking Wireless Networks

A Wireless LAN (WLAN) is an interconnection of computers over a local area network that exchanges data and other information without the use of cables. As more and more firms adopt wireless networks, the security issue becomes more crucial. Business is at high risk from whackers (wireless hackers) who do not need physical entry into the business network to hack, but can compromise a network with the help of freely available tools.


Physical Security

Physical security includes the measures to protect personnel, critical assets, and systems against deliberate attacks and accidents. It intends to prevent the unauthorized access of information and other assets of a company. Physical security does not just cater to securing systems only, but it also involves securing the entire premises, boundaries, workstations, and any other area that may be unique to a company. It provides an added layer of security for networks, by restricting the access of the network resources.


Evading IDS, Firewall and Honeypots

The Intrusion Detection Systems (IDS) and firewalls, honeypots serve various purposes in securing the organization from Internet threats. While the IDS detects any attempts made by an attacker to break into a system, the firewall only allows the authorized users to utilize the network resources and the honeypots are helpful in studying the mode of attacks the attackers use. The attacker will have to somehow come around these security features to remain undetected and not leave any tracks of the attack.



Cryptography is defined as a method of transmitting and storing the information such that only the intended individuals can read and process the data. The sensitive information is protected by encrypting the information. The cryptographic attacks circumvent the security of a cryptographic system by finding a weakness in a code, cipher, and cryptographic protocol in the encryption.
This module familiarizes you with cryptography and the different techniques used in cryptography. It explains about the types of cryptosystems and the types of cryptographic algorithms. It discusses about the private and public key cryptography. It explains about the different RSA attacks, Hash Functions, and Encryption. It also briefs about digital signatures and the attacks on digital signatures and explains the attacks on cryptography and the tools used in cryptography.