Which EC-Council Certified Ethical Hacker (CEH) subdomain would you like to practice for?
| Domain | Subdomain | Practice Tests |
|---|---|---|
| 1. Information Security and Ethical Hacking Overview | 1.1 Introduction to Ethical Hacking | Practest 1 |
| 2. Reconnaissance Techniques | 2.1 Footprinting and Reconnaissance | Practest 1 |
| 2.2 Scanning Networks | Practest 1 | |
| 2.3 Enumeration | Practest 1 | |
| 3. System Hacking Phases and Attack Techniques | 3.1 Vulnerability Analysis | Practest 1 |
| 3.2 System Hacking | Practest 1 | |
| 3.3 Malware Threats | Practest 1 | |
| 4. Network and Perimeter Hacking | 4.1 Sniffing | Practest 1 |
| 4.2 Social Engineering | Practest 1 | |
| 4.3 Denial-of-Service | Practest 1 | |
| 4.4 Session Hijacking | Practest 1 | |
| 4.5 Evading IDS, Firewalls, and Honeypots | Practest 1 | |
| 5. Web Application Hacking | 5.1 Hacking Web Servers | Practest 1 |
| 5.2 Hacking Web Applications | Practest 1 | |
| 5.3 SQL Injection | Practest 1 | |
| 6. Wireless Network Hacking | 6.1 Hacking Wireless Networks | Practest 1 |
| 7. Mobile Platform, IoT, and OT Hacking | 7.1 Hacking Mobile Platforms | Practest 1 |
| 7.2 IoT and OT Hacking | Practest 1 | |
| 8. Cloud Computing | 8.1 Cloud Computing | |
| 9. Cryptography | 9.1 Cryptography |