Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
385 views2 pages

CEH Practical Exam Blueprintv1

The document outlines the exam blueprint for the CEH (Practical) exam. It is divided into 9 domains covering topics such as reconnaissance techniques, system hacking phases, network and perimeter hacking, web application hacking, tools/systems/programs, mobile platforms and cryptography. The exam will consist of 25 questions testing these areas with varying weightages between 5-25% per domain.

Uploaded by

chauguleulkesh17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
385 views2 pages

CEH Practical Exam Blueprintv1

The document outlines the exam blueprint for the CEH (Practical) exam. It is divided into 9 domains covering topics such as reconnaissance techniques, system hacking phases, network and perimeter hacking, web application hacking, tools/systems/programs, mobile platforms and cryptography. The exam will consist of 25 questions testing these areas with varying weightages between 5-25% per domain.

Uploaded by

chauguleulkesh17
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

EC-Council

CEH (Practical) Exam Blueprint v1


CEH (Practical) Exam Blueprint v1
Number of Weightage
Domain Sub Domain Ques�ons (%)
1. Informa�on Security and • Introduc�on to Ethical 1 5%
Ethical Hacking Hacking
2. Reconnaissance Techniques • Footprin�ng and 3 15%
Reconnaissance
• Scanning Networks
• Enumera�on
3. System Hacking Phases and • Vulnerability Analysis 3 15%
A�ack Techniques • System Hacking
• Malware Threats
4. Network and Perimeter • Sniffing 5 25%
Hacking • Social Engineering
• Denial-of-service
• Session Hijacking
• Evading IDS, Firewalls and
Honeypots
5. Web Applica�on Hacking • Hacking Web Servers 3 15%
• Hacking Web Applica�ons
• SQL Injec�on
6. Tools/Systems/Programs • Hacking Wireless 1 5%
Networks
7. Mobile Pla�orm, IoT and OT • Hacking Mobile Pla�orms 2 10%
Hacking • IoT and OT Hacking
8. Cloud Compu�ng • Cloud Compu�ng 1 5%

9. Cryptography • Cryptography 1 5%

Cer�fied Ethical Hacker (Prac�cal) Copyright © by EC-Council


All Rights Reserved. Reproduc�on is Strictly Prohibited.

You might also like