MP4 | Video: h264, 1280×720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 33 lectures (4h 8m) | Size: 1.62 GB
Cyber Security: Phishing attacks hands-on approach
What you’ll learn
How phishing attacks work
Build the required cyber security lab
Practice different kinds of phishing attacks
Learn more about different phishing attacks tools
No requirement or prerequisite this course for absolute beginners
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.
This Course, about phishing attacks and it is divided into the following sections
1- Course Introduction
2- Introduction to phishing attacks. In this section students will learn what is phishing and how hackers send a fraudulent(e.g, spoofed, fake, or otherwise deceptive) message designed to trick a person into revealing sensitive information to the attacker.
3- Build cyber security lab: Student will build their own lab using virtual environment, so they can practice different phishing attacks in safe and legal environment. Students will do the following
a- Download and Install VMware.
b-Download and Install VirtualBox.
c-Download and Install Kali Linux.
d-Download and Install Windows 10 virtual Machine.
4- Essential System Commands: Students will learn a lot pf essential systems commands on both Linux and Windows environment.
5- Essential Information to start phishing attack, so students will learn more about local host and to expose their local webpage to global network. Also, students will learn how to download and install ngrok.
6- Practice different kinds of phishing attacks like,
a- Facebook phishing attack
b- Twitter phishing attack
c- Instagram phishing attack
d-Snapchat phishing attack
e-Linkedln phishing attack
f-Netflix phishing attack
g-Google phishing attack
h-Microsoft phishing attack
i-Yahoo phishing attack
j-Paypal phishing attack
k-ebay phishing attack
7- More phishing tools. Students will learn about more available phishing tools and also learn how install them.
Who this course is for
Any one want to do phishing attacks in hands-on approach