Email phishing
3.8 (16 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
115 students enrolled

Email phishing

How phishing emails are made, understanding the attack, and defense.
3.8 (16 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
115 students enrolled
Created by Jeff M
Last updated 2/2020
English
English [Auto]
Current price: $34.99 Original price: $49.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 4 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • A understanding how phishing (spear phishing) is crafted, researched, and executed. Also how to identify and avoid such attacks.
Requirements
  • A basic understanding of computers and networking. Linux skills prefered. A Windows, Linux, or OSX computer.
Description

In this course we will be taking a look into phishing and spear phishing from both an attacker point of view and also from the receiving end. We will be looking at real life fishing emails, best practices, some phishing software, link attacks, setting up your own phishing campaign and more. I hope that you will take a look at the course and learn about this dangerous attack vector. As always students who take the course feel free to message me during or after you finish if you have any questions. Thanks for looking!

Who this course is for:
  • Anyone that wants to understand phishing/spear phishing. How it is done, how to identify, and how to avoid.
Course content
Expand all 41 lectures 04:10:28
+ Introduction
37 lectures 03:58:40

Welcome to the course!

Preview 01:28

A quick video on what you will need for this course.

What you will need
03:36

A short disclaimer for this course.

Preview 01:09

In this video we learn the difference between phishing and spear phishing

What is phishing and spear phishing
05:05

Why would anyone want to phish someone, let alone you?

Preview 04:08

Why would anyone want to launch a phishing campaign against their own company?

Why launch a phishing campaign (non malicious)
03:34

So why shouldn't we use the same techniques that the bad guys may use?

Why shouldn't I use the same techniques as the bad guys?
04:07

In this video we setup a virtual machine for our lab and go over preparing for a phishing campaign.

Preperation
14:43

Enclosed is a example form for a phishing campaign. Feel free to use it or modify it as you wish.

Sample form
01:35

In this video we discuss a plan of attack for a authorized phishing campaign.

Setting your goals
04:16

Should you launch a phishing campaign once or several times?

Phish one or phish often?
03:23

In this video we discuss how complex your phishing attack should be.

How complex should you make your attack?
04:04

In this video we discuss using free tools vs paid services to launch a phishing campaign.

Paid vs open-source
03:38

In this video we take a look at a couple free phishing tools.

Free phishing resources
01:58

In this video we learn how a attacker can send a phishing email using a regular free email service.

Phishing with a free email account
09:20

In this video we look at a couple ways to manipulate email links

Hiding a link and Z Shadow linking
09:26

In this video we take a look at how a URL shortner can be used in a attack.

Short URL attacks
04:41

In this video we talk a look into the Social Engineer Toolkit by Trustedsec.

The Social Engineering Toolkit (SET)
15:01

In this video we take a look at a couple Android phishing tools and a open-source phishing tool.

Android email spoofers
04:54

In this video we do a little OSINT.

Information gathering
05:14

In this video we take a quick look at Matelgo and how it can be used in a phishing campaign.

Maltego
06:33

In this video we take a look at how social media can be used against us.

Social media
03:42

In this video we talk about bypassing the spam filter.

Bypassing the spam filter
07:19

In this video we talk about using the right bait for a phishing campaign (test).

Using the right bait
04:38

In this video we talk about Google operators.

Google it!
06:46

This is a extra video about Google operators that was contained in the OSINT course. I am adding it as a bonus video.

Google advance operators (Bonus)
07:31

In this video we take a look at different websites that can be used against you.

Website checking
06:49

In this video we take a look at real life phishing emails and break them down.

Preview 18:59

In this video we talk about additional tips to defend against phishing attacks.

Other tips when dealing with a phishing email
09:06

So you clicked on that email, don't panic! We discuss what to do now.

Oops, that email you said don't click on, I clicked it!
09:29

In this video we talk about browser settings, email settings, and network settings that can help protect you.

Browser settings and network settings
14:38

In this video we discuss addition security to protect you and your network.

Additional security
13:16

Security isn't always easy. In this video we go over some pitfalls.

Security isn't always easy
02:00
Training and procedures
03:51

Congratulations!

In closing
01:38

In this bonus video we take a look at the web based program SNDBOX in order to scan potentially dangerous email attachments.

Malware scanning with SNDBOX
09:26
BONUS: Tracking down a phishing email (user)
07:39
+ BONUS Phishing quiz
4 lectures 11:48
Email #1
03:43
Email #2
02:42
Email #3
02:39
Email #4
02:44