Break Me07 Phishing - Going from Recon to Creds
Offered By: YouTube
Course Description
Overview
Explore a comprehensive conference talk on phishing techniques, covering the entire process from reconnaissance to credential harvesting. Delve into expert insights from Adam Compton and Eric Gershman as they discuss advanced strategies and methodologies used in phishing attacks. Gain valuable knowledge on how attackers gather information, craft convincing phishing campaigns, and ultimately obtain credentials. Learn about the latest trends and tactics employed by cybercriminals, and discover effective countermeasures to protect against these threats. This informative session, presented at Derbycon 2015, offers essential information for cybersecurity professionals, IT administrators, and anyone interested in understanding and mitigating phishing risks.
Syllabus
Break Me07 Phishing Groing from Recon to Creds Adam Compton Eric Gershman
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent