Break Me07 Phishing - Going from Recon to Creds
Offered By: YouTube
Course Description
Overview
Explore a comprehensive conference talk on phishing techniques, covering the entire process from reconnaissance to credential harvesting. Delve into expert insights from Adam Compton and Eric Gershman as they discuss advanced strategies and methodologies used in phishing attacks. Gain valuable knowledge on how attackers gather information, craft convincing phishing campaigns, and ultimately obtain credentials. Learn about the latest trends and tactics employed by cybercriminals, and discover effective countermeasures to protect against these threats. This informative session, presented at Derbycon 2015, offers essential information for cybersecurity professionals, IT administrators, and anyone interested in understanding and mitigating phishing risks.
Syllabus
Break Me07 Phishing Groing from Recon to Creds Adam Compton Eric Gershman
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network