Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

CEH Exam Blueprint v2.

EC-Council
Number of
Sec on Knowledge of: Weight

I. Ba ckground A. networki ng technol ogi es (e.g.,


ha rdwa re, i nfra s tructure) 4% 5
B. web technol ogi es (e.g., web 2.0,
s kype)
C. s ys tems technol ogi es
D. communi ca on protocol s
E. ma l wa re opera ons
F. mobi l e technol ogi es (e.g., s ma rt
phones )
G. tel ecommuni ca on technol ogi es
H. ba ckups a nd a rchi vi ng (e.g., l oca l ,
network)
II. Ana l ys i s /As s es s ment A. da ta a na l ys i s 13% 16
B. s ys tems a na l ys i s
C. ri s k a s s es s ments
D. techni ca l a s s es s ment methods
III. Securi ty A. s ys tems s ecuri ty control s 25% 31
B. a ppl i ca on/fil e s erver
C. firewa l l s
D. cryptogra phy
E. network s ecuri ty
F. phys i ca l s ecuri ty
G. threa t model i ng
H. veri fica on procedures (e.g.,
fa l s e pos i ve/nega ve va l i da on)
I. s oci a l engi neeri ng (huma n fa ctors
ma ni pul a on)
J. vul nera bi l i ty s ca nners
K. s ecuri ty pol i cy i mpl i ca ons
L. pri va cy/confiden a l i ty (wi th
rega rd to enga gement)
M. bi ometri cs
N. wi rel es s a cces s technol ogy (e.g.,
networki ng, RFID, Bl uetooth)
O. trus ted networks
P. vul nera bi l i es

CEH Exam Blueprint 1


Number of
Sec on Knowledge of: Weight
IV. Tools / Systems / A. network/hos t ba s ed i ntrus i on 32% 40
Programs
Programs B. network/wi rel es s s ni ffers (e.g.,
Wi reSha rk, Ai rs nort)
C. a cces s control mecha ni s i ms (e.g.,
s ma rt ca rds )
D. cryptogra phy techni ques (e.g.,
IPs ec, SSL, PGP)
E. progra mmi ng l a ngua ges (e.g. C++,
Ja va , C#, C)
F. s cri p ng l a ngua ges (e.g., PHP,
Ja va s cri pt)
G. bounda ry protec on a ppl i a nces
H. network topol ogi es
I. s ubne ng
J. port s ca nni ng (e.g., NMAP)
K. doma i n na me s ys te m (DNS)
L. routers /modems /s wi tches
M. vul nera bi l i ty s ca nner (e.g.,
Nes s us , Re na )
N. vul nera bi l i ty ma na gement a nd
protec on s ys tems (e.g.,
Founds tone, Ecora )
O. opera ng envi ronments (e.g.,
Li nux, Wi ndows , Ma c)
P. a n vi rus s ys tems a nd progra ms
Q. l og a na l ys i s tool s
R. s ecuri ty model s
S. expl oi ta on tool s
T. da ta ba s e s tructures
V. Procedures / A. cryptogra phy 20% 25
Methodology B. publ i c key i nfra s tructure (PKI)
C. Securi ty Archi tecture (SA)
D. Servi ce Ori ented Archi tecture
E. i nforma on s ecuri ty i nci dent
F. N- er a ppl i ca on des i gn
G. TCP/IP networki ng (e.g., network
rou ng)
H. s ecuri ty tes ng methodol ogy
VI. Regul a on/Pol i cy A. s ecuri ty pol i ci es 4% 5
B. compl i a nce regul a ons (e.g., PCI)
VII. Ethi cs A. profes s i ona l code of conduct 2% 3
B. a ppropri a tenes s of ha cki ng

CEH Exam Blueprint 2

You might also like