Email Phishing is a social engineering attack where criminals send a spoofed email and asks for sensitive data. The recipient is tricked into clicking the malicious link which leads to malware installation or a ransomware attack. It is usually used as a method to gain access into corporate networks.
This Course Will Help You To
|Learn to suspect a phishing attack.|
|Learn proactive phishing techniques for protection.|
|Deploy specialized anti phishing solutions.|
Who is it for?
Anyone willing to learn about phishing, how it is done and how to prevent it.
Each chapter of the course will start with an overview and some references which you can use to explore further on some subjects. It will then be followed by hands on demonstration which you can replicate within a lab environment which we will help you to build.
About the Course
Phishing is used to gather information using deceptive e-mails and websites making the receiver vulnerable. These attacks are disguised in such a way that the users are tricked into believing that it’s a valid link from the bank or their workplace, it can be a clickable or downloadable link.
In this course, we will learn about phishing and spear phishing from both an attacker’s point of view and from the receiving end. We will be looking at real-life phishing emails, best practices, some phishing software, link attacks, setting up our own phishing campaign, and more. This course will help you learn about this dangerous attack vector.
By the end of this course, you will understand how phishing (spear phishing) is crafted, researched, and executed. You will also learn to identify and avoid such attacks. This course can help you secure your IT ecosystems.
What You Will Need?
2. What You Will Need?
4. What is Phishing and Spear Phishing?
5. Why Would Anyone Want to Phish Me?
6. Why Launch a Phishing Campaign? (Non-malicious)
7. Why Shouldn’t I Use the Same Techniques as the Bad Guys?
9. Sample Form
10. Setting Your Goals
11. Phish One or Phish Often?
12. How Complex Should You Make Your Attack
13. Paid vs. Open-source
14. Free Phishing Resources
15. Phishing with a Free Email Account
16. Hiding a Link and Z Shadow Linking
17. Short URL Attacks
18. The Social Engineering Toolkit (SET)
19. Android Email Spoofers
20. Information Gathering
22. Social Media
23. Bypassing the Spam Filter
24. Using the Right Bait
25. Google It!
26. Google Advance Operators
27. Website Checking
28. A Look into (Real) Phishing Email(s)
29. Other Tips When Dealing with a Phishing Email
30. Oops, That Email You Said Don’t Click on, I Clicked It!
31. Browser Settings and Network Settings
32. Additional Security
33. Security Isn’t Always Easy
34. Training and Procedures
35. Malware Scanning with SNDBOX
36. Phishing Quiz – 1
37. Phishing Quiz – 2
38. Phishing Quiz – 3
39. In Closing
Know Your Author
Jeff Minakata has worked in the IT industry for over 19 years. He holds various cybersecurity certifications, networking certifications, and engineering certifications. Jeff has also written OSINT and ethical hacking articles for Hackin9 and eForensics magazine.
Jeff currently works on the computer networking side and teaches ethical hacking, OSINT, and cybersecurity online (Udemy bestseller and highest rated). He is passionate about helping people understand OSINT, ethical hacking, and cybersecurity.
Customers Who Loved Our Courses
The amount of knowledge and the link with various tools and websites used for the purpose.
Got useful information about tools and methods.
All about it course, it’s perfect but the better is the tips for determinate when we are receiving a phishing mail and react to it.
A very comprehensive treatment of a subject area that poses one of the greatest InfoSec risks to organisations.