This course is in active development. Preview the scope below and create a free account to be notified the moment it goes live.
ECCouncil EHE
The EC‑Council Ethical Hacking Essentials (EHE) exam teaches foundational ethical hacking concepts, including reconnaissance, system hacking, malware, social engineering, and network attacks, enabling learners to understand and assess security vulnerabilities.
Who Should Take This
It is ideal for aspiring cybersecurity professionals, IT students, or network administrators who have little to no pentesting experience but seek a solid grounding in ethical hacking. These learners aim to validate their knowledge, enhance their career prospects, and prepare for entry‑level security roles.
What's Covered
1
Ethical Hacking Fundamentals
2
Reconnaissance and Footprinting
3
System Hacking
4
Malware and Social Engineering
5
Network Attacks
6
Web Application Attacks
7
Wireless and Mobile Security
8
Cryptography Basics
9
Vulnerability Assessment and Reporting
What's Included in AccelaStudy® AI
Course Outline
62 learning goals
1
Ethical Hacking Fundamentals
2 topics
Security concepts and methodology
- Describe the CIA triad and explain how confidentiality integrity and availability guide security testing objectives and scope.
- Identify the five ethical hacking phases including reconnaissance scanning gaining access maintaining access and covering tracks.
- Apply legal and ethical requirements by defining scope limitations rules of engagement and responsible disclosure procedures in test planning.
- Analyze a penetration testing scenario to determine the appropriate methodology, scope boundaries, and authorization requirements.
Threat actors and attack vectors
- Identify threat actor categories including nation-state organized crime hacktivists insiders and script kiddies and describe their capabilities.
- Apply the MITRE ATT&CK framework to classify observed attack techniques into tactical categories for threat intelligence reporting.
- Analyze attack vector combinations to determine the most likely kill chain path for a given target environment and threat actor profile.
2
Reconnaissance and Footprinting
3 topics
Passive reconnaissance
- Describe passive information gathering including WHOIS lookups DNS queries search engine dorking and social media intelligence collection.
- Apply OSINT tools to gather publicly available target information including employee names email formats technology stacks and infrastructure details.
- Analyze passive reconnaissance findings to build a target profile and identify potential attack surfaces without alerting the target organization.
Active scanning
- Describe active scanning concepts including host discovery port scanning service detection and OS fingerprinting techniques and detection risks.
- Identify scan types including TCP connect SYN stealth UDP FIN XMAS and NULL scans and their respective detection profiles and use cases.
- Apply Nmap to perform host discovery port scanning and service version detection and interpret output identifying open ports and service versions.
- Analyze scan results to map the attack surface identifying exploitable services default configurations and potential entry points.
Enumeration techniques
- Describe enumeration for extracting usernames network shares DNS records SNMP data and LDAP directory information from target systems.
- Apply enumeration tools to extract user accounts shared resources and service configurations from Windows and Linux target environments.
- Analyze enumeration results to identify privileged accounts misconfigured shares and exposed services representing viable attack entry points.
3
System Hacking
2 topics
Password attacks
- Describe password attack types including brute force dictionary credential stuffing password spraying rainbow tables and pass-the-hash techniques.
- Apply password cracking tools to demonstrate weak password vulnerability and recommend policy improvements based on cracking speed analysis.
- Analyze password policy effectiveness by evaluating hash algorithm strength salting implementation and lockout threshold configurations.
Privilege escalation and persistence
- Describe privilege escalation types including vertical and horizontal escalation through misconfigurations kernel exploits and token manipulation.
- Apply privilege escalation enumeration scripts to identify weak service permissions SUID binaries and unquoted service paths on target systems.
- Analyze system configurations to map privilege escalation paths and recommend hardening measures including permission restrictions and patching.
4
Malware and Social Engineering
2 topics
Malware types and analysis
- Identify malware categories including viruses worms trojans ransomware spyware rootkits botnets and fileless malware and propagation methods.
- Describe malware analysis approaches including static file analysis dynamic sandbox execution behavioral monitoring and IoC extraction techniques.
- Apply malware detection using antivirus tools file hash verification process monitoring and network analysis to identify malicious software.
- Analyze indicators of compromise including unusual connections registry modifications and unexpected processes to determine malware infection scope.
Social engineering attacks
- Describe social engineering techniques including phishing spear phishing vishing smishing pretexting baiting and tailgating and their triggers.
- Apply social engineering assessment techniques to design phishing simulation campaigns and evaluate organizational resistance to manipulation attacks.
- Analyze a social engineering attack scenario to evaluate sophistication identify defensive gaps and recommend technical and awareness countermeasures.
5
Network Attacks
2 topics
Network-level attacks
- Describe network attacks including ARP poisoning DNS spoofing DHCP starvation VLAN hopping and man-in-the-middle interception techniques.
- Identify DoS attack types including SYN flood UDP flood HTTP flood amplification and distributed denial of service using coordinated botnets.
- Apply Wireshark packet capture to observe network traffic patterns and identify suspicious communications during security assessment activities.
- Analyze captured traffic to identify attack indicators including ARP anomalies DNS manipulation beaconing patterns and data exfiltration channels.
Session hijacking and evasion
- Describe session hijacking including cookie theft session fixation CSRF and TCP sequence prediction and their impact on web applications.
- Apply session management testing to identify insecure session tokens missing HttpOnly flags and inadequate session expiration configurations.
- Analyze IDS evasion techniques including fragmentation encoding encryption and protocol manipulation to assess detection coverage gaps.
6
Web Application Attacks
2 topics
OWASP Top 10 vulnerabilities
- Describe OWASP Top 10 including injection broken authentication XSS insecure deserialization security misconfiguration and SSRF vulnerabilities.
- Explain SQL injection types including union-based blind boolean time-based and error-based injection and describe parameterized query defenses.
- Apply web application scanning to identify common vulnerabilities and interpret scanner output to prioritize findings by severity and exploitability.
- Analyze web vulnerability findings to assess exploitability potential data exposure and recommend remediation including input validation and encoding.
Cross-site scripting and injection defenses
- Describe XSS attack types including stored reflected and DOM-based XSS and explain output encoding and CSP header defenses.
- Apply input validation and output encoding techniques to test web application resistance against injection and cross-site scripting attacks.
- Analyze web application security test results to evaluate remediation completeness and identify residual injection or XSS vulnerabilities.
7
Wireless and Mobile Security
2 topics
Wireless attacks
- Describe wireless attacks including WEP cracking WPA2 handshake capture deauthentication floods rogue access points and Bluetooth exploitation.
- Apply wireless reconnaissance tools to discover access points identify encryption types detect hidden SSIDs and map wireless coverage areas.
- Analyze wireless assessment results to identify weak encryption unauthorized access points and client isolation failures requiring remediation.
Mobile and IoT vulnerabilities
- Describe mobile security risks including malicious apps jailbreaking insecure storage and mobile malware distribution through unofficial stores.
- Apply mobile application security testing concepts to identify insecure data storage improper certificate validation and excessive permissions.
- Analyze IoT device deployments to identify default credential vulnerabilities unencrypted communications and insufficient update mechanisms.
8
Cryptography Basics
2 topics
Encryption and hashing
- Describe symmetric algorithms AES and 3DES asymmetric algorithms RSA and ECC and their roles in securing communications and data protection.
- Apply cryptographic hash verification to check file integrity validate digital signatures and verify password hash storage implementations.
- Analyze cryptographic implementations to identify weak algorithms insufficient key lengths and improper random number generation vulnerabilities.
PKI and certificate security
- Describe PKI components including certificate authorities digital certificates CRLs OCSP and certificate trust chain validation processes.
- Apply certificate inspection to verify website authenticity identify expired or self-signed certificates and assess certificate chain completeness.
- Analyze TLS configurations to identify weak cipher suites expired certificates and protocol version vulnerabilities requiring security upgrades.
9
Vulnerability Assessment and Reporting
2 topics
Vulnerability scanning
- Describe vulnerability assessment methodologies including network host application credentialed and non-credentialed scanning approaches.
- Apply vulnerability scanning tools to perform automated assessments and interpret CVSS scores severity ratings and remediation recommendations.
- Analyze vulnerability findings to prioritize remediation based on exploitability asset criticality available patches and compensating control options.
Reporting and remediation
- Describe penetration testing report components including executive summary findings risk ratings evidence and remediation recommendations.
- Apply findings documentation by recording exploitation evidence screenshots and step-by-step reproduction procedures for each identified vulnerability.
- Analyze assessment results across multiple targets to identify systemic security weaknesses organizational risk patterns and strategic remediation priorities.
Scope
Included Topics
- All modules in EC-Council Ethical Hacking Essentials covering reconnaissance scanning system hacking malware web attacks wireless security and vulnerability assessment.
- Ethical hacking methodology phases legal considerations threat actors MITRE ATT&CK and security testing approaches.
- Reconnaissance using OSINT footprinting Nmap scanning service detection enumeration and target profiling techniques.
- System attacks including password cracking privilege escalation malware analysis and social engineering techniques.
- Web application OWASP Top 10 vulnerabilities wireless attacks mobile security and cryptography fundamentals.
Not Covered
- Advanced penetration testing exploit development and post-exploitation covered by CEH and CPENT.
- Enterprise network defense SIEM and SOC operations covered by CND and CSA.
- Digital forensics investigation and malware reverse engineering covered by CHFI.
- Compliance governance and executive risk management frameworks.
- Secure coding and DevSecOps pipeline security covered by CASE and ECDE.
Official Exam Page
Learn more at EC-Council
112-52 is coming soon
Adaptive learning that maps your knowledge and closes your gaps.
Create Free Account to Be Notified