Defend your Organization against Phishing Attacks




Email Phishing is a social engineering attack where criminals send a spoofed email and asks for sensitive data. The recipient is tricked into clicking the malicious link which leads to malware installation or a ransomware attack. It is usually used as a method to gain access into corporate networks.


This Course Will Help You To

Learn to suspect a phishing attack.
Learn proactive phishing techniques for protection.
Deploy specialized anti phishing solutions.

Who is it for?

Anyone willing to learn about phishing, how it is done and how to prevent it.


Each chapter of the course will start with an overview and some references which you can use to explore further on some subjects. It will then be followed by hands on demonstration which you can replicate within a lab environment which we will help you to build.

About the Course

icon box image


4 hours

icon box image



icon box image




Phishing is used to gather information using deceptive e-mails and websites making the receiver vulnerable. These attacks are disguised in such a way that the users are tricked into believing that it’s a valid link from the bank or their workplace, it can be a clickable or downloadable link.

In this course, we will learn about phishing and spear phishing from both an attacker’s point of view and from the receiving end. We will be looking at real-life phishing emails, best practices, some phishing software, link attacks, setting up our own phishing campaign, and more. This course will help you learn about this dangerous attack vector.

By the end of this course, you will understand how phishing (spear phishing) is crafted, researched, and executed. You will also learn to identify and avoid such attacks. This course can help you secure your IT ecosystems.


What You Will Need?



Course Outline

1. Introduction

2. What You Will Need?

3. Disclaimer

4. What is Phishing and Spear Phishing?

5. Why Would Anyone Want to Phish Me?

6. Why Launch a Phishing Campaign? (Non-malicious)

7. Why Shouldn’t I Use the Same Techniques as the Bad Guys?

8. Preparation

9. Sample Form

10. Setting Your Goals

11. Phish One or Phish Often?

12. How Complex Should You Make Your Attack

13. Paid vs. Open-source

14. Free Phishing Resources

15. Phishing with a Free Email Account

16. Hiding a Link and Z Shadow Linking

17. Short URL Attacks

18. The Social Engineering Toolkit (SET)

19. Android Email Spoofers

20. Information Gathering

21. Maltego

22. Social Media

23. Bypassing the Spam Filter

24. Using the Right Bait

25. Google It!

26. Google Advance Operators

27. Website Checking

28. A Look into (Real) Phishing Email(s)

29. Other Tips When Dealing with a Phishing Email

30. Oops, That Email You Said Don’t Click on, I Clicked It!

31. Browser Settings and Network Settings

32. Additional Security

33. Security Isn’t Always Easy

34. Training and Procedures

35. Malware Scanning with SNDBOX

36. Phishing Quiz – 1

37. Phishing Quiz – 2

38. Phishing Quiz – 3

39. In Closing

Jeff Minakata

Know Your Author

Jeff Minakata has worked in the IT industry for over 19 years. He holds various cybersecurity certifications, networking certifications, and engineering certifications. Jeff has also written OSINT and ethical hacking articles for Hackin9 and eForensics magazine.

Jeff currently works on the computer networking side and teaches ethical hacking, OSINT, and cybersecurity online (Udemy bestseller and highest rated). He is passionate about helping people understand OSINT, ethical hacking, and cybersecurity.




learn python
[spb_gopricing pricing_table=”code-red_5_5ee3b9e94420e” width=”1/1″ el_position=”first last”]

Customers Who Loved Our Courses


Email Phishing


The amount of knowledge and the link with various tools and websites used for the purpose.



Got useful information about tools and methods.



All about it course, it’s perfect but the better is the tips for determinate when we are receiving a phishing mail and react to it.



A very comprehensive treatment of a subject area that poses one of the greatest InfoSec risks to organisations.