EC-Council CEH (CEH v10) Exam Syllabus

CEH PDF, 312-50 Dumps, 312-50 PDF, CEH VCE, 312-50 Questions PDF, EC-Council 312-50 VCE, EC-Council CEH v10 Dumps, EC-Council CEH v10 PDFUse this quick start guide to collect all the information about EC-Council CEH (312-50) Certification exam. This study guide provides a list of objectives and resources that will help you prepare for items on the 312-50 EC-Council Certified Ethical Hacker exam. The Sample Questions will help you identify the type and difficulty level of the questions and the Practice Exams will make you familiar with the format and environment of an exam. You should refer this guide carefully before attempting your actual EC-Council CEH v10 certification exam.

The EC-Council CEH certification is mainly targeted to those candidates who want to build their career in Cyber Security domain. The EC-Council Certified Ethical Hacker (CEH) exam verifies that the candidate possesses the fundamental knowledge and proven skills in the area of EC-Council CEH v10.

EC-Council CEH Exam Summary:

Exam Name EC-Council Certified Ethical Hacker (CEH)
Exam Code 312-50
Exam Price $950 (USD)
Duration 240 mins
Number of Questions 125
Passing Score 70%
Books / Training Courseware
Schedule Exam Pearson VUE
Sample Questions EC-Council CEH Sample Questions
Practice Exam EC-Council 312-50 Certification Practice Exam

EC-Council 312-50 Exam Syllabus Topics:

Topic Details

Background - 21.79%

Network and Communication Technologies - Networking technologies (e.g., hardware, infrastructure)
- Web technologies (e.g., web 2.0, skype)
- Systems technologies
- Communication protocols
- Telecommunication technologies
- Mobile technologies (e.g., smartphones)
- Wireless terminologies
- Cloud computing
- Cloud deployment models
Information Security Threats and Attack Vectors - Malware (e.g., Trojan, virus, backdoor, worms)
- Malware operations
- Information security threats and attack vectors
- Attacks on a system (e.g., DoS, DDoS, session hijacking, webserver and web application attacks, SQL injection, wireless threats)
- Botnet
- Cloud computing threats and attacks
- Mobile platform attack vectors
- Cryptography attacks
Information Security Technologies - Information security elements
- Information security management (e.g. IA, Defense-in-Depth, incident management)
- Security trends
- Hacking and ethical hacking
- Vulnerability assessment and penetration testing
- Cryptography
- Encryption algorithms
- Wireless encryption
- Bring Your Own Device (BYOD)
- Backups and archiving (e.g., local, network)
- IDS, firewalls, and honeypots

Analysis / Assessment - 12.73%

Information Security Assessment and Analysis - Data analysis
- Systems analysis
- Risk assessments
- Vulnerability assessment and penetration testing
- Technical assessment methods
- Network sniffing
- Malware analysis
Information Security Assessment Process - Footprinting
- Scanning (e.g., Port scanning, banner grabbing, vulnerability scanning, network discovery, proxy chaining, IP spoofing)
- Enumeration
- System hacking (e.g., password cracking, privilege escalation, executing applications, hiding files, covering tracks)

Security - 23.73%

Information Security Controls - Systems security controls
- Application/file server
- IDS
- Firewalls
- Cryptography
- Disk Encryption
- Network security
- Physical security
- Threat modeling
- Biometrics
- Wireless access technology (e.g., networking, RFID, Bluetooth)
- Trusted networks
- Privacy/confidentiality (with regard to engagement)
Information Security Attack Detection - Security policy implications
- Vulnerability detection 
- IP Spoofing detection
- Verification procedures (e.g., false positive/negative validation)
- Social engineering (human factors manipulation)
- Vulnerability scanning
- Malware detection
- Sniffer detection
- DoS and DDoS detection
- Detect and block rogue AP
- Evading IDS (e.g., evasion, fragmentation)
- Evading Firewall (e.g., firewalking, tunneling)
- Honeypot detection
- Steganalysis
Information Security Attack Prevention - Defend against webserver attacks
- Patch management
- Encoding schemes for web application
- Defend against web application attacks
- Defend against SQL injection attacks
- Defend against wireless and Bluetooth attacks
- Mobile platforms security
- Mobile Device Management (MDM)
- BYOD Security
- Cloud computing security

Tools / Systems / Programs - 28.91%

Information Security Systems - Network/host based intrusion
- Boundary protection appliances 
- Access control mechanisms (e.g., smart cards)
- Cryptography techniques (e.g., IPSec, SSL, PGP)
- Domain name system (DNS)
- Network topologies
- Subnetting
- Routers / modems / switches
- Security models
- Database structures
Information Security Programs - Operating environments (e.g., Linux, Windows, Mac)
- Anti-malware systems and programs (e.g., anti-keylogger, anti-spyware, anti-rootkit, anti-trojan, anti-virus)
- Wireless IPS deployment
- Programming languages (e.g. C++, Java, C#, C)
- Scripting languages (e.g., PHP, Javascript)
Information Security Tools - Network/wireless sniffers (e.g., Wireshark, Airsnort)
- Port scanning tools (e.g., Nmap, Hping)
- Vulnerability scanner (e.g., Nessus, Qualys, Retina)
- Vulnerability management and protection systems (e.g., Founds tone, Ecora)
- Log analysis tools
- Exploitation tools
- Footprinting tools (e.g., Maltego, FOCA, Recon-ng)
- Network discovery tools (e.g., Network Topology Mapper)
- Enumeration tools (e.g., SuperScan, Hyena, NetScanTools Pro)
- Steganography detection tools
- Malware detection tools
- DoS/DDoS protection tools
- Patch management tool (e.g., MBSA)
- Webserver security tools
- Web application security tools (e.g., Acunetix WVS)
- Web application firewall (e.g., dotDefender)
- SQL injection detection tools (e.g., IBM Security AppScan)
- Wireless and Bluetooth security tools
- Android, iOS, Windows Phone OS, and BlackBerry device security tools
- MDM Solutions
- Mobile Protection Tools
- Intrusion Detection Tools (e.g., Snort)
- Hardware and software firewalls (e.g., Comodo Firewall)
- Honeypot tools (e.g., KFSenser)
- IDS/Firewall evasion tools (e.g., Traffic IQ Professional)
- Packet fragment generators
- Honeypot Detection Tools
- Cloud security tools (e.g., Core CloudInspect)
- Cryptography tools (e.g., Advanced Encryption Package)
- Cryptography toolkit (e.g., OpenSSL)
- Disk encryption tools
- Cryptanalysis tool (e.g., CrypTool)

Procedures / Methodology - 8.77%

Information Security Procedures - Cryptography
- Public key infrastructure (PKI)
- Digital signature and Pretty Good Privacy (PGP)
- Security Architecture (SA)
- Service oriented architecture
- Information security incident
- N-tier application design
- TCP/IP networking (e.g., network routing)
- Security testing methodology
Information Security Assessment Methodologies - Web server attack methodology
- Web application hacking methodology
- SQL injection methodology and evasion techniques
- SQL injection evasion techniques
- Wireless and Bluetooth hacking methodology
- Mobile platform (Android, iOS, Windows Phone OS, and BlackBerry) hacking methodology
- Mobile Rooting and Jailbreaking

Regulation / Policy - 1.90%

Information Security Policies/Laws/Acts - Security policies
- Compliance regulations (e.g., PCI-DSS, SOX)

Ethics - 2.17%

Ethics of Information Security - Professional code of conduct
- Appropriateness of hacking

To ensure success in EC-Council CEH v10 certification exam, we recommend authorized training course, practice test and hands-on experience to prepare for EC-Council Certified Ethical Hacker (312-50) exam.

Rating: 4.7 / 5 (56 votes)