Ethical Hacker Pro
Exam Objectives

TestOut Ethical Hacker Pro Exam Objectives - Beta


    Given a scenario, perform reconnaissance
    • Perform reconnaissance with operating system tools
    • Perform reconnaissance with hacking tools
    Given a scenario, perform scanning
    • Scan for network devices
    • Discover wireless devices
    • Scan for IoT devices
    • Detect operating systems and applications
    • Identify open ports
    • Scan for vulnerabilities
    Given a scenario, perform enumeration
    • Enumerate network resources
    • Enumerate device information

Gain Access

    Given a scenario, obtain login credentials
    • Obtain credentials using tools
    • Use Social Engineering
    Given a scenario, gain administrative access and escalate privileges
    • Gain access through a backdoor
    • Escalate privileges
    • Hijack a web session
    • Crack Wi-Fi devices


    Given a scenario, perform passive online attacks
    • Examine hidden web form fields
    • Conduct a man-in-the-middle attack
    • Perform passive sniffing
    Given a scenario, perform active online attacks
    • Perform an SQL injection
    • Execute a DoS or DDoS attack
    • Perform active sniffing
    Given a scenario, perform infrastructure attacks
    • Attack a web server
    • Access wireless networks
    • Evade firewalls, IDSs, and honeypots

Cover Up

    Given a scenario, cover up access
    • Disable auditing
    • Clear logs
    • Remove or hide files and folders
    • Change MAC address

Defend a System

    Given a scenario, defend systems and devices
    • Hide a web server banner broadcast
    • Discover rogue hosts and configure protection
    • Secure mobile devices
    • Configure account policies and account control
    • Ensure file integrity
    • Implement drive encryption
    • Use malware protection
    Given a scenario, implement defensive systems
    • Implement an Intrusion Detection System (IDS)
    • Create a honeypot
    • Prevent DNS zone transfer
    • Disable unnecessary services
    • Implement physical security countermeasures
    • Configure a perimeter firewall
Explore TestOut Pro Certifications