CEH Cheat Sheet

Certified Ethical Hacker v13 - Master All 20 Core Modules

4 Hours
Exam Duration
125
Questions
20 Modules
Study Areas
EC-Council
Certification Body

Introduction to Ethical Hacking

Module 01

CIA Triad, hacker types, 5-phase methodology, legal and ethical considerations

Footprinting and Reconnaissance

Module 02

Passive and active reconnaissance, OSINT, Google dorking, information gathering tools

Scanning Networks

Module 03

Port scanning techniques, Nmap commands, network discovery, steganography detection

Enumeration

Module 04

Service enumeration, NetBIOS, SNMP, LDAP, SMTP vulnerability identification

Vulnerability Analysis

Module 05

CVSS scoring, vulnerability scanners, assessment methodologies, penetration testing

System Hacking

Module 06

Password attacks, privilege escalation, backdoors, rootkits, and covering tracks

Malware Threats

Module 07

Virus, worms, trojans, ransomware analysis, malware detection and prevention

Sniffing

Module 08

Network traffic analysis, packet capture tools, protocols vulnerabilities

Social Engineering

Module 09

Human-based attacks, phishing, pretexting, psychological manipulation techniques

Denial-of-Service

Module 10

DoS and DDoS attacks, botnets, traffic flooding, mitigation strategies

Session Hijacking

Module 11

TCP hijacking, session prediction, man-in-the-middle attacks

Evading IDS, Firewalls, and Honeypots

Module 12

IDS evasion techniques, firewall bypassing, honeypot detection

Hacking Web Servers

Module 13

Web server vulnerabilities, attack methodologies, server hardening

Hacking Web Applications

Module 14

OWASP Top 10, SQL injection, XSS, CSRF, web application security testing

SQL Injection

Module 15

Database attacks, blind SQL injection, union-based attacks, prevention techniques

Hacking Wireless Networks

Module 16

WiFi security protocols, WEP/WPA attacks, rogue access points

Hacking Mobile Platforms

Module 17

iOS and Android security, mobile malware, app security testing

IoT Hacking

Module 18

IoT device vulnerabilities, firmware analysis, RF attacks, smart home security

Cloud Computing

Module 19

Cloud security models, container attacks, serverless vulnerabilities

Cryptography

Module 20

Encryption algorithms, hash functions, PKI, cryptanalysis techniques

Interactive Study Features

Start Your Interactive CEH Study Session

Experience the most comprehensive way to study for your Certified Ethical Hacker certification. Swipe through expertly crafted study cards covering all 20 EC-Council modules with real-world attack scenarios.

Enable JavaScript to access the full interactive experience.