YoVDO

Phishing - Going From Recon to Credentials

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Ethical Hacking Courses Digital Forensics Courses Phishing Attacks Courses Reconnaissance Courses Credential Theft Courses

Course Description

Overview

Dive into the world of phishing attacks with this 27-minute conference talk from BSidesLV 2015. Explore the fundamentals of phishing, including its definition, background, and various types of attacks. Learn about the motivations behind phishing and the kind of information attackers seek. Follow the fishing process from reconnaissance to reporting, and discover fishing tools and automation techniques. Get an overview of the Speed Fishing Framework and watch a live demonstration. Gain insights into future developments in the field of phishing and cybersecurity.

Syllabus

Intro
Who am I
Why Phishing
What is Phishing
Background on Phishing
What Kind of Information Are They After
Types of Phishing Attacks
Why Use Phishing
The Fishing Process
Recon
Waiting Game
Reporting
Fishing Tools
Automation
Speed Fishing Framework
Speed Fishing Framework Overview
Demo
Future Work
Outro


Taught by

BSidesLV

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX