Initial Access with Gophish
Offered By: Pluralsight
Course Description
Overview
Explore social engineering techniques to execute a malicious link phishing campaign and discover how to simulate a malicious attachment attack.
Are you looking for a tool that can quickly and easily set up phishing campaigns and host its own landing pages? In this course, Initial Access with Gophish, you’ll cover how to utilize Gophish to complete Initial Access in a red team environment. First, you’ll see how to install Gophish and navigate through its features. Next, you’ll explore social engineering techniques to execute a malicious link phishing campaign and capture credentials. Finally, you’ll discover how to simulate a malicious attachment attack to gain access to your target. When you’re finished with this course, you’ll have the skills and knowledge to execute this technique - T1566: Spearphishing using Gophish.
Are you looking for a tool that can quickly and easily set up phishing campaigns and host its own landing pages? In this course, Initial Access with Gophish, you’ll cover how to utilize Gophish to complete Initial Access in a red team environment. First, you’ll see how to install Gophish and navigate through its features. Next, you’ll explore social engineering techniques to execute a malicious link phishing campaign and capture credentials. Finally, you’ll discover how to simulate a malicious attachment attack to gain access to your target. When you’re finished with this course, you’ll have the skills and knowledge to execute this technique - T1566: Spearphishing using Gophish.
Taught by
Matt Glass
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent