Break Me07 Phishing - Going from Recon to Creds
Offered By: YouTube
Course Description
Overview
Explore a comprehensive conference talk on phishing techniques, covering the entire process from reconnaissance to credential harvesting. Delve into expert insights from Adam Compton and Eric Gershman as they discuss advanced strategies and methodologies used in phishing attacks. Gain valuable knowledge on how attackers gather information, craft convincing phishing campaigns, and ultimately obtain credentials. Learn about the latest trends and tactics employed by cybercriminals, and discover effective countermeasures to protect against these threats. This informative session, presented at Derbycon 2015, offers essential information for cybersecurity professionals, IT administrators, and anyone interested in understanding and mitigating phishing risks.
Syllabus
Break Me07 Phishing Groing from Recon to Creds Adam Compton Eric Gershman
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX