You are on page 1of 3

CEH Exam Blueprint v2.

EC-Council

Sec on

Knowledge of:

A. networki ng technol ogi es (e.g.,


ha rdwa re, i nfra s tructure)
B. web technol ogi es (e.g., web 2.0,
s kype)
C. s ys tems technol ogi es
D. communi ca on protocol s
E. ma l wa re opera ons
F. mobi l e technol ogi es (e.g., s ma rt
phones )
G. tel ecommuni ca on technol ogi es
H. ba ckups a nd a rchi vi ng (e.g., l oca l ,
network)
II. Ana l ys i s /As s es s ment A. da ta a na l ys i s
B. s ys tems a na l ys i s
C. ri s k a s s es s ments
D. techni ca l a s s es s ment methods
III. Securi ty
A. s ys tems s ecuri ty control s
B. a ppl i ca on/l e s erver
C. rewa l l s
D. cryptogra phy
E. network s ecuri ty
F. phys i ca l s ecuri ty
G. threa t model i ng
H. veri ca on procedures (e.g.,
fa l s e pos i ve/nega ve va l i da on)
I. s oci a l engi neeri ng (huma n fa ctors
ma ni pul a on)
J. vul nera bi l i ty s ca nners
K. s ecuri ty pol i cy i mpl i ca ons
L. pri va cy/conden a l i ty (wi th
rega rd to enga gement)
M. bi ometri cs
N. wi rel es s a cces s technol ogy (e.g.,
networki ng, RFID, Bl uetooth)
O. trus ted networks
P. vul nera bi l i es

I. Ba ckground

CEH Exam Blueprint

Weight

Number of

4%

13%

16

25%

31

Sec on
IV. Tools / Systems /
Programs
Programs

V. Procedures /
Methodology

VI. Regul a on/Pol i cy


VII. Ethi cs

CEH Exam Blueprint

Number of

Knowledge of:

Weight

A. network/hos t ba s ed i ntrus i on
B. network/wi rel es s s ni ers (e.g.,
Wi reSha rk, Ai rs nort)
C. a cces s control mecha ni s i ms (e.g.,
s ma rt ca rds )
D. cryptogra phy techni ques (e.g.,
IPs ec, SSL, PGP)
E. progra mmi ng l a ngua ges (e.g. C++,
Ja va , C#, C)
F. s cri p ng l a ngua ges (e.g., PHP,
Ja va s cri pt)
G. bounda ry protec on a ppl i a nces
H. network topol ogi es
I. s ubne ng
J. port s ca nni ng (e.g., NMAP)
K. doma i n na me s ys te m (DNS)
L. routers /modems /s wi tches
M. vul nera bi l i ty s ca nner (e.g.,
Nes s us , Re na )
N. vul nera bi l i ty ma na gement a nd
protec on s ys tems (e.g.,
Founds tone, Ecora )
O. opera ng envi ronments (e.g.,
Li nux, Wi ndows , Ma c)
P. a n vi rus s ys tems a nd progra ms
Q. l og a na l ys i s tool s
R. s ecuri ty model s
S. expl oi ta on tool s
T. da ta ba s e s tructures
A. cryptogra phy
B. publ i c key i nfra s tructure (PKI)
C. Securi ty Archi tecture (SA)
D. Servi ce Ori ented Archi tecture
E. i nforma on s ecuri ty i nci dent
F. N- er a ppl i ca on des i gn
G. TCP/IP networki ng (e.g., network
rou ng)
H. s ecuri ty tes ng methodol ogy
A. s ecuri ty pol i ci es
B. compl i a nce regul a ons (e.g., PCI)
A. profes s i ona l code of conduct
B. a ppropri a tenes s of ha cki ng

32%

40

20%

25

4%

2%

You might also like