The CEH exam covers a range of topics that help demonstrate competency in advanced security skills including:
Before taking the CEH certification exam, you should feel confident in demonstrating your knowledge across these 7 core areas:
-
Network and Information Security Technologies
Understand the purpose and use for various network, communication, and security technologies to prevent security threats such as malware, DDoS attacks, Botnet, cryptography threats, mobile platform attacks, and more.
-
Analysis & Assessment
Understand how to analyze and assess data, systems, networks to prevent security attacks.
-
Security
Demonstrate how to implement advanced information security controls to defend against attacks including web server attacks, SQL injection attacks, Bluetooth attacks, and more.
-
Tools, Systems & Programs
Demonstrate proficiency in identifying and implementing proper security tools, systems, and programs for a variety of business environments such as network/host base intrusion, anti-malware systems, network/wireless sniffers, and more.
-
Procedures & Methodologies
Identify and deploy information security procedures and methodologies including cryptography, public key infrastructure (PKI), and SQL injections.
-
Regulation & Policy
Identify and deploy information security procedures and methodologies including cryptography, public key infrastructure (PKI), and SQL injections.
-
Ethics
Understanding of professional code of conduct and appropriate behaviors for ethical hacking, adhering to the First Do No Harm rule.