EC-Council • EHE
Validates foundational understanding of ethical hacking and penetration testing concepts, covering information security fundamentals, threats and vulnerabilities, password cracking, web application attacks, IoT and OT security, cloud computing threats, and penetration testing methodology.
Questions
627
Duration
120 minutes
Passing Score
70%
Difficulty
FoundationalLast Updated
Feb 2026
The Ethical Hacking Essentials (EHE) is an entry-level cybersecurity certification from EC-Council, designed to validate foundational knowledge of ethical hacking principles, penetration testing concepts, and information security fundamentals. Delivered under EC-Council's Essentials Series, it covers a broad spectrum of attack surfaces and defensive countermeasures across 12 modules, including network-level attacks, web application vulnerabilities, social engineering, wireless security, IoT and operational technology (OT) threats, and cloud computing risks. The certification carries exam code 112-52 and is valid for three years, with no continuing education fees or EC-Council Continuing Education Credits (ECEs) required during that period.
EHE serves as a structured on-ramp for individuals new to the cybersecurity field, bridging the gap between general IT knowledge and the more advanced Certified Ethical Hacker (CEH) credential. The course includes 15 hours of premium learning content and 11 hands-on labs, ensuring candidates gain both conceptual understanding and practical exposure to real-world attack techniques and countermeasures.
EHE is aimed at individuals who are beginning their journey in cybersecurity and information security. There are no formal IT or cybersecurity experience requirements, making it accessible to career changers, recent graduates, and students exploring the field. Job roles that align with this certification include entry-level security analyst, junior penetration tester, IT support professional seeking to pivot into security, and cybersecurity student.
The credential is also well-suited for professionals in adjacent IT roles—such as system administrators or network technicians—who want to formalize their understanding of attacker methodologies and threat landscapes. It is frequently pursued as a first step before attempting the CEH or other intermediate-level certifications.
There are no formal eligibility requirements or prerequisites to register for the EHE exam. EC-Council explicitly states that no prior IT or cybersecurity experience is necessary, making this one of the most accessible credentials in the EC-Council portfolio.
However, candidates benefit from a basic understanding of how computers and networks operate, including familiarity with operating system concepts, IP addressing, and common internet protocols. Those with some exposure to IT fundamentals—through coursework, self-study, or personal projects—will find the material easier to absorb and retain during preparation.
The EHE exam (code 112-52) consists of 75 multiple-choice questions and must be completed within 120 minutes. A passing score of 70% is required. The exam is administered through EC-Council's ECC Exam Center and can be taken online in a proctored environment. The exam cost is $49.99 for the exam voucher through select channels, though pricing may vary by region and training bundle.
The certification is valid for three years from the date of a successful attempt. Recertification is achieved by retaking the exam at the end of the three-year validity period. No continuing education credits or fees are required to maintain the credential during its active term.
Earning the EHE credential demonstrates to employers that a candidate possesses structured, vendor-validated knowledge of ethical hacking fundamentals, which can differentiate entry-level applicants in a competitive cybersecurity job market. The certification is recognized as a stepping stone toward higher-value EC-Council credentials, most notably the Certified Ethical Hacker (CEH), which is widely required or preferred for penetration tester, security analyst, and red team roles. EHE holders are positioned for roles such as junior security analyst, cybersecurity support specialist, and IT risk analyst.
While the EHE itself is a foundational credential and does not command the same salary premium as CEH or OSCP, it validates commitment to the field and provides a recognized credential for candidates building their first cybersecurity resume. Entry-level cybersecurity roles in the United States typically range from $55,000 to $85,000 annually, and holding a recognized certification from EC-Council can accelerate hiring and interview opportunities, particularly at organizations that already use EC-Council training for their security teams.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 627 questions.
1. An ethical hacker performs a port scan against a target system using a technique that sends TCP packets with the FIN, PSH, and URG flags set. The goal is to bypass non-stateful firewalls that only block SYN packets. Which Nmap scan type is being used? (Select one!)
Explanation
XMAS scan sets the FIN, PSH, and URG flags, making the packet light up like a Christmas tree. This technique can bypass simple firewalls that only filter SYN packets. NULL scan sends packets with no flags set. SYN scan uses only the SYN flag for stealthy half-open scanning. ACK scan uses only the ACK flag to map firewall rules rather than identify open ports.
2. An attacker who has compromised a Windows system wants to remove evidence of malicious activity by clearing specific event logs without deleting the entire log file. Which command accomplishes this? (Select one!)
Explanation
The wevtutil command-line utility with the cl (clear-log) parameter efficiently clears Windows event logs including Security, Application, and System logs. This removes all entries while preserving the log structure. The eventvwr.msc GUI does not allow deletion of individual entries in most log types. Deleting the physical log file requires stopping the Event Log service and may trigger alerts. Stopping the eventlog service prevents new logging but does not remove existing entries and is highly suspicious.
3. During a penetration test of a switched network environment, an attacker needs to intercept traffic between two hosts. The attacker sends thousands of frames with random source MAC addresses to overflow the switch's CAM table. What is the primary objective of this attack? (Select one!)
Explanation
MAC flooding attacks overflow the switch's CAM table with random MAC address entries. When the CAM table fills completely, the switch enters fail-open mode and begins broadcasting all traffic like a hub, allowing passive sniffing. This is the primary objective enabling traffic interception. ARP cache poisoning is a different attack using forged ARP responses. While MAC flooding may degrade switch performance, causing denial of service is not the primary objective. MAC flooding does not target or capture administrator credentials.
4. A wireless security assessment reveals that an organization uses WEP encryption for legacy device compatibility. The security consultant warns that WEP can be compromised within minutes due to cryptographic weaknesses. Which specific vulnerability makes WEP insecure? (Select one!)
Explanation
WEP uses a 24-bit Initialization Vector (IV) that causes collisions, combined with RC4 cryptographic flaws and static keys, making it easily crackable within minutes. AES-CCMP is the strong encryption used by WPA2. Protected Management Frames are a WPA3 security feature. SAE (Simultaneous Authentication of Equals) replaces PSK in WPA3. WEP is deprecated and should never be used.
5. A penetration tester successfully exploits a web application and gains a low-privilege shell on a Linux server. The tester discovers a binary file with the SUID bit set owned by root. When executed, this binary runs with which user's privileges? (Select one!)
Explanation
SUID (Set User ID) binaries execute with the privileges of the file owner rather than the user who runs them. When a SUID binary is owned by root, any user executing it runs the binary with root privileges, creating a privilege escalation vector if the binary has vulnerabilities or can be exploited. This is a common Linux privilege escalation technique where attackers search for SUID binaries using find / -perm -4000 to identify potential escalation paths. The binary does not run with the executing user's limited privileges. www-data is a common web server user but not relevant to SUID behavior. Kernel-level execution requires different exploitation techniques.
One-time access to this exam