CEH v11
Information Security &
Ethical Hacking
DOMAIN 1
www.infosectrain.com
About CEH v11
www.infosectrain.com | sales@infosectrain.com 01
DOMAIN 1
Information Security & Ethical Hacking Oveview
A CEH (Certified Ethical Hacker) is a professional who typically works within a
Red Team environment. A Certified Ethical Hacker’s focus must be on attacking
systems and accessing applications, networks, databases, or other crucial
data on the secured systems. In addition to recognizing attack strategies and
exploiting creative attack vectors, a CEH can mimic the skills and creativity of
malicious hackers. Unlike black hat hackers, certified ethical hackers approach
systems with permission from their owners and maintain the confidentiality of
their work.
The job opportunities for a Certified Ethical Hacker are very high because of the
increasing cybercrimes. If you are interested in learning CEH, this blog is for
you. In this blog, you will get to know about all the domains of CEH certification.
Let’s dive into the topic.
www.infosectrain.com | sales@infosectrain.com 02
Domains of CEH
DOMAIN 1
Information Security &
Ethical Hacking Overview
DOMAIN 2
Reconnaissance
Techniques
DOMAIN 3
System hacking
phases
& Attack Techniques
DOMAIN 4
Network and perimeter
hacking
DOMAIN 5
Web application hacking
DOMAIN 6
Wireless network hacking
DOMAIN 7
Mobile platform, IoT,
& OT hacking
DOMAIN 8
Cloud Computing
DOMAIN 9
Cryptography
CEH v11
DOMAINS
6%
21%
17%
14%
16%
6%
8%
6%
6%
Information Security &
Ethical Hacking Overview
www.infosectrain.com | sales@infosectrain.com 03
DOMAIN 1
Information Security & Ethical Hacking Oveview
The process of hacking involves finding vulnerabilities within a computer
system. In addition to stealing sensitive information, they can delete files and
perform other malicious activities using these vulnerabilities. It is illegal to
hack into computers, so you may face sanctions and be imprisoned for years
and years if caught. Nevertheless, hacking is legal when conducted with
permission. Usually, hackers are hired by owners of organisations to penetrate
their systems to discover vulnerabilities so that they can be remedied. Such
people who have access to your systems without any malicious intent are
called Ethical Hackers, and the process is called Ethical Hacking.
In this blog, we will discuss the 1st
domain of CEH,
which is ‘Information Security & Ethical
Hacking Overview’
www.infosectrain.com | sales@infosectrain.com 04
DOMAIN 1
Information Security & Ethical Hacking Oveview
The importance of Ethical Hacking
The fundamental goal of an ethical hacker is to prevent sensitive data and
information from getting into the hands of cyber violators. It protects your
organisation from being threatened with extortion by individuals looking to
take advantage of the weaknesses.
The advantages of Ethical Hacking:
Organisations can find security flaws from an attacker’s point of view to
strengthen defenses.
> We can implement a secure network that blocks security violations.
> Ethical hackers can defend national security by preventing terrorists from
gaining access to sensitive information.
> We can gain the confidence of our consumers and investors by providing
secure products and data.
Types of Ethical Hacking
www.infosectrain.com | sales@infosectrain.com 05
DOMAIN 1
Information Security & Ethical Hacking Oveview
Since virtually any system component may be hacked, there are several ethical
hacking methods that need an in-depth understanding of that component.
Below you’ll find a list of several ethical hacking techniques.
> Web application hacking
> Social Engineering techniques
> System hacking
> Hacking wireless networks
> Web server hacking
01
www.infosectrain.com | sales@infosectrain.com 06
Web Application Hacking
DOMAIN 1
Information Security & Ethical Hacking Oveview
Web hacking refers to the exploitation of HTTP applications by altering the
application’s graphical web interface, tampering with the Uniform Resource
Identifier (URI), or modifying HTTP components not present in the URI.
02
www.infosectrain.com | sales@infosectrain.com 07
Social Engineering Techniques
DOMAIN 1
Information Security & Ethical Hacking Oveview
In social engineering, the goal is to manipulate others into disclosing sensitive
information. Criminals employ social engineering techniques because it is far
easier to take advantage of your inherent tendency to trust others than it is to
figure out how to hack your program or system.
03
www.infosectrain.com | sales@infosectrain.com 08
System Hacking
DOMAIN 1
Information Security & Ethical Hacking Oveview
As a result of the penetration of computer systems and software, system
hacking allows the hacker to get control of the target machine and steal or
misuse the data on it. A malevolent hacker takes advantage of the flaws in a
computer system or network to get access to its data or benefit illegally.
04
www.infosectrain.com | sales@infosectrain.com 09
Hacking Wireless Networks
DOMAIN 1
Information Security & Ethical Hacking Oveview
A wireless network is a collection of two or more devices connected by radio
waves within a restricted spatial range. Because wireless networks use radio
waves to communicate, an intruder may simply sniff the network from a
nearby place. Sniffing the network for SSID is a common attack technique used
by hackers.
05
www.infosectrain.com | sales@infosectrain.com 10
Web Server Hacking
DOMAIN 1
Information Security & Ethical Hacking Oveview
A server-side software program generates web content in real-time. Hackers
use DoS (DDoS) assaults, SYN floods, ping floods, port scans, sniffer attacks, and
social engineering to steal credentials, passwords, and corporate information
from the web server.
Job Opportunities you get as an
Ethical Hacker
www.infosectrain.com | sales@infosectrain.com 11
DOMAIN 1
Information Security & Ethical Hacking Oveview
> Information Security Analyst
> Security Analyst
> Certified Ethical Hacker (CEH)
> Ethical Hacker
> Security Consultant(Computing/Networking/Information Technology)
> Information Security Manager
> Penetration Tester
www.infosectrain.com | sales@infosectrain.com

Domain 1 of CEH v11: Information Security and Ethical Hacking

  • 1.
    CEH v11 Information Security& Ethical Hacking DOMAIN 1 www.infosectrain.com
  • 2.
    About CEH v11 www.infosectrain.com| sales@infosectrain.com 01 DOMAIN 1 Information Security & Ethical Hacking Oveview A CEH (Certified Ethical Hacker) is a professional who typically works within a Red Team environment. A Certified Ethical Hacker’s focus must be on attacking systems and accessing applications, networks, databases, or other crucial data on the secured systems. In addition to recognizing attack strategies and exploiting creative attack vectors, a CEH can mimic the skills and creativity of malicious hackers. Unlike black hat hackers, certified ethical hackers approach systems with permission from their owners and maintain the confidentiality of their work. The job opportunities for a Certified Ethical Hacker are very high because of the increasing cybercrimes. If you are interested in learning CEH, this blog is for you. In this blog, you will get to know about all the domains of CEH certification. Let’s dive into the topic.
  • 3.
    www.infosectrain.com | sales@infosectrain.com02 Domains of CEH DOMAIN 1 Information Security & Ethical Hacking Overview DOMAIN 2 Reconnaissance Techniques DOMAIN 3 System hacking phases & Attack Techniques DOMAIN 4 Network and perimeter hacking DOMAIN 5 Web application hacking DOMAIN 6 Wireless network hacking DOMAIN 7 Mobile platform, IoT, & OT hacking DOMAIN 8 Cloud Computing DOMAIN 9 Cryptography CEH v11 DOMAINS 6% 21% 17% 14% 16% 6% 8% 6% 6%
  • 4.
    Information Security & EthicalHacking Overview www.infosectrain.com | sales@infosectrain.com 03 DOMAIN 1 Information Security & Ethical Hacking Oveview The process of hacking involves finding vulnerabilities within a computer system. In addition to stealing sensitive information, they can delete files and perform other malicious activities using these vulnerabilities. It is illegal to hack into computers, so you may face sanctions and be imprisoned for years and years if caught. Nevertheless, hacking is legal when conducted with permission. Usually, hackers are hired by owners of organisations to penetrate their systems to discover vulnerabilities so that they can be remedied. Such people who have access to your systems without any malicious intent are called Ethical Hackers, and the process is called Ethical Hacking. In this blog, we will discuss the 1st domain of CEH, which is ‘Information Security & Ethical Hacking Overview’
  • 5.
    www.infosectrain.com | sales@infosectrain.com04 DOMAIN 1 Information Security & Ethical Hacking Oveview The importance of Ethical Hacking The fundamental goal of an ethical hacker is to prevent sensitive data and information from getting into the hands of cyber violators. It protects your organisation from being threatened with extortion by individuals looking to take advantage of the weaknesses. The advantages of Ethical Hacking: Organisations can find security flaws from an attacker’s point of view to strengthen defenses. > We can implement a secure network that blocks security violations. > Ethical hackers can defend national security by preventing terrorists from gaining access to sensitive information. > We can gain the confidence of our consumers and investors by providing secure products and data.
  • 6.
    Types of EthicalHacking www.infosectrain.com | sales@infosectrain.com 05 DOMAIN 1 Information Security & Ethical Hacking Oveview Since virtually any system component may be hacked, there are several ethical hacking methods that need an in-depth understanding of that component. Below you’ll find a list of several ethical hacking techniques. > Web application hacking > Social Engineering techniques > System hacking > Hacking wireless networks > Web server hacking
  • 7.
    01 www.infosectrain.com | sales@infosectrain.com06 Web Application Hacking DOMAIN 1 Information Security & Ethical Hacking Oveview Web hacking refers to the exploitation of HTTP applications by altering the application’s graphical web interface, tampering with the Uniform Resource Identifier (URI), or modifying HTTP components not present in the URI.
  • 8.
    02 www.infosectrain.com | sales@infosectrain.com07 Social Engineering Techniques DOMAIN 1 Information Security & Ethical Hacking Oveview In social engineering, the goal is to manipulate others into disclosing sensitive information. Criminals employ social engineering techniques because it is far easier to take advantage of your inherent tendency to trust others than it is to figure out how to hack your program or system.
  • 9.
    03 www.infosectrain.com | sales@infosectrain.com08 System Hacking DOMAIN 1 Information Security & Ethical Hacking Oveview As a result of the penetration of computer systems and software, system hacking allows the hacker to get control of the target machine and steal or misuse the data on it. A malevolent hacker takes advantage of the flaws in a computer system or network to get access to its data or benefit illegally.
  • 10.
    04 www.infosectrain.com | sales@infosectrain.com09 Hacking Wireless Networks DOMAIN 1 Information Security & Ethical Hacking Oveview A wireless network is a collection of two or more devices connected by radio waves within a restricted spatial range. Because wireless networks use radio waves to communicate, an intruder may simply sniff the network from a nearby place. Sniffing the network for SSID is a common attack technique used by hackers.
  • 11.
    05 www.infosectrain.com | sales@infosectrain.com10 Web Server Hacking DOMAIN 1 Information Security & Ethical Hacking Oveview A server-side software program generates web content in real-time. Hackers use DoS (DDoS) assaults, SYN floods, ping floods, port scans, sniffer attacks, and social engineering to steal credentials, passwords, and corporate information from the web server.
  • 12.
    Job Opportunities youget as an Ethical Hacker www.infosectrain.com | sales@infosectrain.com 11 DOMAIN 1 Information Security & Ethical Hacking Oveview > Information Security Analyst > Security Analyst > Certified Ethical Hacker (CEH) > Ethical Hacker > Security Consultant(Computing/Networking/Information Technology) > Information Security Manager > Penetration Tester
  • 13.