0% found this document useful (0 votes)
88 views4 pages

EHEv1 Exam Blueprint

Uploaded by

Zak Selase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views4 pages

EHEv1 Exam Blueprint

Uploaded by

Zak Selase
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

EC-Council



Exam Blueprint v1
Ethical Hacking Essentials Exam 112-52
Exam Blueprint

Ethical Hacking Essentials


Exam Blueprint

S. No. Domains Sub Domains Domain %

Information Security Information Security Fundamentals


1 6
Fundamentals Information Security Laws and Regulations
Cyber Kill Chain Methodology
Hacking Concepts and Hacker Classes
Ethical Hacking Different Phases of Hacking Cycle
2 6
Fundamentals
Ethical Hacking Concepts, Scope, and
Limitations
Ethical Hacking Tools
Threat and Threat Sources
Information Security Malware and its Types
Threats and
3 Malware Countermeasures 10
Vulnerability
Assessment Vulnerabilities
Vulnerability Assessment
Password Cracking Techniques
Password Cracking
4 Techniques and Password Cracking Tools 6
Countermeasures
Password Cracking Countermeasures
Social Engineering Concepts and its Phases
Social Engineering Social Engineering Techniques
5 Techniques and 8
Countermeasures Insider Threats and Identity Theft
Social Engineering Countermeasures

Page | 1 Ethical Hacking Essentials Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Essentials Exam 112-52
Exam Blueprint

Packet Sniffing Concepts


Sniffing Techniques
Sniffing Countermeasures
Network Level
6 Attacks and DoS and DDoS Attacks 12
Countermeasures
DoS and DDoS Attack Countermeasures
Session Hijacking Attacks
Session Hijacking Attack Countermeasures
Web Server Attacks
Web Server Attack Countermeasures
Web Application Architecture and
Web Application Vulnerability Stack
7 Attacks and 12
Web Application Threats and Attacks
Countermeasures
Web Application Attack Countermeasures
SQL Injection Attacks
SQL Injection Attack Countermeasures
Wireless Terminology
Wireless Encryption
Wireless Attacks and
8 Wireless Network-Specific Attack Techniques 10
Countermeasures
Bluetooth Attacks
Wireless Attack Countermeasures
Mobile Attack Anatomy
Mobile Platform Attack Vectors and
Mobile Attacks and Vulnerabilities
9 8
Countermeasures
Mobile Device Management (MDM) Concept
Mobile Attack Countermeasures
IoT Concepts
IoT Threats and Attacks

IoT and OT Attacks IoT Attack Countermeasures


10 10
and Countermeasures OT Concepts

OT Threats and Attacks


OT Attack Countermeasures

Page | 2 Ethical Hacking Essentials Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Essentials Exam 112-52
Exam Blueprint

Cloud Computing Concepts


Cloud Computing Container Technology
11 Threats and 8
Countermeasures Cloud Computing Threats
Cloud Attack Countermeasures
Fundamentals of Penetration Testing and its
Benefits
Penetration Testing
12 Strategies and Phases of Penetration Testing 4
Fundamentals
Guidelines and Recommendations for
Penetration Testing

Page | 3 Ethical Hacking Essentials Copyright © by EC-Council


All Rights Reserved. Reproduction is Strictly Prohibited.

You might also like