0% found this document useful (0 votes)
357 views5 pages

CEH Exam Blueprint v4.0: EC-Council

The document outlines the exam blueprint for the Certified Ethical Hacker (CEH) exam. It is divided into 5 domains covering topics such as reconnaissance techniques, system hacking phases, network and perimeter hacking, web application hacking, and web server hacking. The blueprint provides the sub-domains, description, number of exam questions, and weightage for each domain to guide exam preparation. In total, there are 5 domains and 65 questions on the CEH exam.

Uploaded by

GustavoBusch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
357 views5 pages

CEH Exam Blueprint v4.0: EC-Council

The document outlines the exam blueprint for the Certified Ethical Hacker (CEH) exam. It is divided into 5 domains covering topics such as reconnaissance techniques, system hacking phases, network and perimeter hacking, web application hacking, and web server hacking. The blueprint provides the sub-domains, description, number of exam questions, and weightage for each domain to guide exam preparation. In total, there are 5 domains and 65 questions on the CEH exam.

Uploaded by

GustavoBusch
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

CEH Exam Blueprint v4.

EC-Council
CHFI
CEH Exam
ExamBlueprint
Blueprint v4.0
v3.0 11
Number of Weightage
Domain Sub Domain Description
Questions (%)

1. Information Introduction to Ethical • Information Security Overview 8 6%


Security and Hacking • Cyber Kill Chain Concepts
Ethical Hacking • Hacking Concepts
Overview • Ethical Hacking Concepts
• Information Security Controls
• Information Security Laws and Standards
2. Reconnaissance Footprinting and • Footprinting Concepts 10 21%
Techniques Reconnaissance • Footprinting Methodology
• Footprinting through Search Engines
• Footprinting through Web Services
• Footprinting through Social Networking Sites
• Website Footprinting
• Email Footprinting
• Whois Footprinting
• DNS Footprinting
• Network Footprinting
• Footprinting through Social Engineering
• Footprinting Tools
• Footprinting Countermeasures
Scanning Networks • Network Scanning Concepts 10
• Scanning Tools
• Host Discovery
• Port and Service Discovery
• OS Discovery (Banner Grabbing/OS
Fingerprinting)
• Scanning Beyond IDS and Firewall
• Draw Network Diagrams
Enumeration • Enumeration Concepts 6
• NetBIOS Enumeration
• SNMP Enumeration
• LDAP Enumeration
• NTP and NFS Enumeration
• SMTP and DNS Enumeration
• Other Enumeration Techniques (IPsec, VoIP, RPC,
Unix/Linux, Telnet, FTP, TFTP, SMB, IPv6, and BGP
enumeration)
• Enumeration Countermeasures
3. System Vulnerability Analysis • Vulnerability Assessment Concepts 9 17%
Hacking Phases • Vulnerability Classification and Assessment
and Attack Types
Techniques • Vulnerability Assessment Solutions and Tools
• Vulnerability Assessment Reports

CHFI
CEH Exam
ExamBlueprint
Blueprint v4.0 02
02
System Hacking • System Hacking Concepts 6
• Gaining Access
• Cracking Passwords
• Vulnerability Exploitation
• Escalating Privileges
• Maintaining Access
• Executing Applications
• Hiding Files
• Clearing Logs
Malware Threats • Malware Concepts 6
• APT Concepts
• Trojan Concepts
• Virus and Worm Concepts
• File-less Malware Concepts
• Malware Analysis
• Malware Countermeasures
• Anti-Malware Software
4. Network and Sniffing • Sniffing Concepts 3 14%
Perimeter • Sniffing Technique: MAC Attacks
Hacking • Sniffing Technique: DHCP Attacks
• Sniffing Technique: ARP Poisoning
• Sniffing Technique: Spoofing Attacks
• Sniffing Technique: DNS Poisoning
• Sniffing Tools
• Sniffing Countermeasures
• Sniffing Detection Techniques
Social Engineering • Social Engineering Concepts 5
• Social Engineering Techniques
• Insider Threats
• Impersonation on Social
• Networking Sites
• Identity Theft
• Social Engineering Countermeasures
Denial-of-Service • DoS/DDoS Concepts 2
• DoS/DDoS Attack Techniques
• Botnets
• DDoS
• Case Study
• DoS/DDoS Attack Tools
• DoS/DDoS Countermeasures
• DoS/DDoS Protection Tools
Session Hijacking • Session Hijacking Concepts 3
• Application Level Session Hijacking
• Network Level Session Hijacking
• Session Hijacking Tools
• Session Hijacking Countermeasures

CHFI
CEH Exam
ExamBlueprint
Blueprint v4.0 03
03
Evading IDS, Firewalls, • IDS, IPS, Firewall, and Honeypot Concepts 5
and Honeypots • IDS, IPS, Firewall, and Honeypot Solutions
• Evading IDS
• Evading Firewalls
• IDS/Firewall Evading Tools
• Detecting Honeypots
• IDS/Firewall Evasion Countermeasures
5. Web Hacking Web Servers • Web Server Concepts 8 16%
Application • Web Server Attacks
Hacking • Web Server Attack Methodology
• Web Server Attack Tools
• Web Server Countermeasures
• Patch Management
• Web Server Security Tools
Hacking Web • Web App Concepts 8
Applications • Web App Threats
• Web App Hacking Methodology
• Footprint Web Infrastructure
• Analyze Web Applications
• Bypass Client-Side Controls
• Attack Authentication Mechanism
• Attack Authorization Schemes
• Attack Access Controls
• Attack Session Management Mechanism
• Perform Injection Attacks
• Attack Application Logic Flaws
• Attack Shared Environments
• Attack Database Connectivity
• Attack Web App Client
• Attack Web Services
• Web API, Webhooks and Web Shell
• Web App Security
SQL Injection • SQL Injection Concepts 4
• Types of SQL Injection
• SQL Injection Methodology
• SQL Injection Tools
• Evasion Techniques
• SQL Injection Countermeasures
6. Wireless Network Hacking Wireless • Wireless Concepts 8 6%
Hacking Networks • Wireless Encryption
• Wireless Threats
• Wireless Hacking Methodology
• Wireless Hacking Tools
• Bluetooth Hacking
• Wireless Countermeasures
• Wireless Security Tools
7. Mobile Platform, Hacking Mobile • Mobile Platform Attack Vectors 4 8%
IoT, and OT Platforms • Hacking Android OS
Hacking • Hacking iOS
• Mobile Device Management
• Mobile Security Guidelines and Tools

CHFI
CEH Exam
ExamBlueprint
Blueprint v4.0 04
04
IoT and OT Hacking • IoT Concepts 6
• IoT Attacks
• IoT Hacking Methodology
• IoT Hacking Tools
• IoT Countermeasures
• OT Concepts
• OT Attacks
• OT Hacking Methodology
• OT Hacking Tools
• OT Countermeasures
8. Cloud Computing Cloud Computing • Cloud Computing Concepts 7 6%
• Container Technology
• Serverless Computing
• Cloud Computing Threats
• Cloud Hacking
• Cloud Security
9. Cryptography Cryptography • Cryptography Concepts 7 6%
• Encryption Algorithms
• Cryptography Tools
• Public Key Infrastructure (PKI)
• Email Encryption
• Disk Encryption
• Cryptanalysis
• Countermeasures

CHFI
CEH Exam
ExamBlueprint
Blueprint v4.0 05
05

You might also like