Skill
Vendor
Exam
Certification
Login/Signup
Search
Certified Ethical Hacker
Exam code :
312-50 CEH
version : 10
Vendor :
EC-Council
Exam description:
None
Area :
Hacking
Status : Active
Exam start on : 31-10-2018 end on :
Duration (minutes): 240
Questions : min 125 - max 125
Score : min 60%-85% over 100%
Cost :
Language :
Format : Closed Book
Delivery : Testing center - Proctored
Note :
Exam topics:
1 - Background
- 4%
1.1 - Networking technologies (e.g., hardware, infrastructure)
1.2 - Web technologies (e.g., web 2.0, skype)
1.3 - Systems technologies
1.4 - Communication on protocols
1.5 - Malware operations
1.6 - Mobile technologies (e.g., smartphones )
1.7 - Telecommunication on technologies
1.8 - Backups and archiving (e.g., local, network)
2 - Analysis / Assessment
- 13%
2.1 - Data analysis
2.2 - Systems analysis
2.2 - Risk assessments
2.3 - Technical assessment methods
3 - Security
- 25%
3.1 - Systems security controls
3.2 - Application/file server
3.3 - Firewalls
3.4 - Cryptography
3.5 - Network security
3.6 - Physical security
3.7 - Threat modeling
3.8 - Verification procedures (e.g., false positive/negative validation)
3.9 - Social engineering (human factors manipulation)
3.10 - Vulnerability scanners
3.11 - Security policy implications
3.12 - Privacy/confidentiality (with regard to engagement)
3.13 - Biometrics
3.14 - Wireless access technology (e.g., networking, RFID, Bluetooth)
3.15 - Trusted networks
3.16 - Vulnerabilities
4 - Tools / Systems / Programs
- 32%
4.1 - Network/host based intrusion
4.2 - Network/wireless sniffers (e.g., WireShark, Airsnort)
4.3 - Access control mechanisims (e.g., smart cards )
4.4 - Cryptography techniques (e.g., IPsec, SSL, PGP)
4.5 - Programming languages (e.g. C++, Java, C, C#)
4.6 - Scripting languages (e.g., PHP, Java script)
4.7 - Boundary protection appliances
4.8 - Network topologies
4.9 - Subnetting
4.10 - Port scanning (e.g., NMAP)
4.11 - Domain name system (DNS)
4.12 - Routers /modems /switches
4.13 - Vulnerability scanner (e.g., Nessus, Rena)
4.14 - Vulnerability management and protection systems (e.g.,
4.15 - Founds tone, Ecora)
4.16 - Operating environments (e.g., Linux, Windows, Mac)
4.17 - Antivirus systems and programs
4.18 - Log analysis tools
4.19 - Security models
4.20 - Exploitation tools
4.11 - Database structures
5 - Procedures / Methodology
- 25%
5.1 - Cryptography
5.2 - Public key infrastructure (PKI)
5.3 - Security Architecture (SA)
5.4 - Service Oriented Architecture
5.5 - Information security incident
5.6 - N-tier application design
5.7 - TCP/IP networking (e.g., network routing)
5.8 - Security testing methodology
6 - Regulation / Policy
- 4%
6.1 - Security policies
6.2 - Compliance regulations (e.g., PCI)
7 - Ethics
- 2%
7.1 - Professional code of conduct
7.2 - Appropriateness of hacking
External link to official page of exam
Certified Ethical Hacker
Updateted information on : 19-02-2020
Return to exam list