Phishing - Going from Recon to Credentials
Offered By: YouTube
Course Description
Overview
Explore the intricacies of phishing attacks in this 27-minute conference talk from BSidesLV 2015. Delve into the motivations behind phishing, its definition, and historical context. Discover the types of information targeted by attackers and the various forms of phishing attacks. Learn about the phishing process, including the waiting game and reporting mechanisms. Examine phishing tools, automation techniques, and the Speed Fishing Framework. Witness a live demonstration and gain insights into future developments in the field of phishing.
Syllabus
Intro
Agenda
Why Phishing
What is Phishing
Background on Phishing
What Kind of Information Are They After
Phishing Attacks
Why Use Fishing
Fishing Process
Waiting Game
Reporting
Fishing Tools
Automation
Speed Fishing Framework
Demo
Future Work
Thank You
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network