EC-Council
Exam Blueprint v1
Ethical Hacking Essentials Exam 112-52
Exam Blueprint
Ethical Hacking Essentials
Exam Blueprint
S. No. Domains Sub Domains Domain %
Information Security Information Security Fundamentals
1 6
Fundamentals Information Security Laws and Regulations
Cyber Kill Chain Methodology
Hacking Concepts and Hacker Classes
Ethical Hacking Different Phases of Hacking Cycle
2 6
Fundamentals
Ethical Hacking Concepts, Scope, and
Limitations
Ethical Hacking Tools
Threat and Threat Sources
Information Security Malware and its Types
Threats and
3 Malware Countermeasures 10
Vulnerability
Assessment Vulnerabilities
Vulnerability Assessment
Password Cracking Techniques
Password Cracking
4 Techniques and Password Cracking Tools 6
Countermeasures
Password Cracking Countermeasures
Social Engineering Concepts and its Phases
Social Engineering Social Engineering Techniques
5 Techniques and 8
Countermeasures Insider Threats and Identity Theft
Social Engineering Countermeasures
Page | 1 Ethical Hacking Essentials Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Essentials Exam 112-52
Exam Blueprint
Packet Sniffing Concepts
Sniffing Techniques
Sniffing Countermeasures
Network Level
6 Attacks and DoS and DDoS Attacks 12
Countermeasures
DoS and DDoS Attack Countermeasures
Session Hijacking Attacks
Session Hijacking Attack Countermeasures
Web Server Attacks
Web Server Attack Countermeasures
Web Application Architecture and
Web Application Vulnerability Stack
7 Attacks and 12
Web Application Threats and Attacks
Countermeasures
Web Application Attack Countermeasures
SQL Injection Attacks
SQL Injection Attack Countermeasures
Wireless Terminology
Wireless Encryption
Wireless Attacks and
8 Wireless Network-Specific Attack Techniques 10
Countermeasures
Bluetooth Attacks
Wireless Attack Countermeasures
Mobile Attack Anatomy
Mobile Platform Attack Vectors and
Mobile Attacks and Vulnerabilities
9 8
Countermeasures
Mobile Device Management (MDM) Concept
Mobile Attack Countermeasures
IoT Concepts
IoT Threats and Attacks
IoT and OT Attacks IoT Attack Countermeasures
10 10
and Countermeasures OT Concepts
OT Threats and Attacks
OT Attack Countermeasures
Page | 2 Ethical Hacking Essentials Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Ethical Hacking Essentials Exam 112-52
Exam Blueprint
Cloud Computing Concepts
Cloud Computing Container Technology
11 Threats and 8
Countermeasures Cloud Computing Threats
Cloud Attack Countermeasures
Fundamentals of Penetration Testing and its
Benefits
Penetration Testing
12 Strategies and Phases of Penetration Testing 4
Fundamentals
Guidelines and Recommendations for
Penetration Testing
Page | 3 Ethical Hacking Essentials Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.