Phighting Phishers Phake Phronts
Offered By: YouTube
Course Description
Overview
Explore techniques for combating phishing attacks in this 41-minute conference talk from BSides San Francisco 2015. Delve into various types of phishing, including spearfishing, clone phishing, and whaling. Learn about dedicated servers, compromised domains, and high-profile breaches like Anthem and the White House. Examine the anatomy of a phish, its prevalence, and associated costs. Discover tools and methods such as DES Point, ASN, Timmings, Edit Distance, HTTrack, and the Social Engineering Toolkit. Gain insights from speaker Kevin Bottomley on effective strategies to protect against sophisticated phishing attempts and social engineering tactics.
Syllabus
Introduction
Topics
About Me
What is Phishing
Spearfishing
Clone Phishing
Whaling
Dedicated Server
compromised domain
Anthem breach
White House breach
Anatomy of a fish
Phishing
The Numbers
The Costs
DES Pointment
ASN
Stimming
Edit Distance
HTTrack
Social Engineering Toolkit
Other Steps
Jeremiah OConnor
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network