YoVDO

Phishing - Going from Recon to Credentials

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Phishing Courses

Course Description

Overview

Explore the intricacies of phishing attacks in this 27-minute conference talk from BSidesLV 2015. Delve into the motivations behind phishing, its definition, and historical context. Discover the types of information targeted by attackers and the various forms of phishing attacks. Learn about the phishing process, including the waiting game and reporting mechanisms. Examine phishing tools, automation techniques, and the Speed Fishing Framework. Witness a live demonstration and gain insights into future developments in the field of phishing.

Syllabus

Intro
Agenda
Why Phishing
What is Phishing
Background on Phishing
What Kind of Information Are They After
Phishing Attacks
Why Use Fishing
Fishing Process
Waiting Game
Reporting
Fishing Tools
Automation
Speed Fishing Framework
Demo
Future Work
Thank You


Related Courses

Network Security
Georgia Institute of Technology via Udacity
Privacy and Security in Online Social Media
Indian Institute of Technology Delhi via Swayam
The Absolute Beginners Guide to Cyber Security 2024 - Part 1
Udemy
Offensive Security Engineering
Udemy
Cyber Security Foundations: Common Malware Attacks and Defense Strategies
EC-Council via FutureLearn