HOME > IT & Software > Cyber Security, Ethical Hacking Intro to Phishing

Cyber Security, Ethical Hacking Intro to Phishing

SynopsisCyber Security, Ethical Hacking – Intro to Phishing, av...
Cyber Security, Ethical Hacking Intro to Phishing  No.1

Cyber Security, Ethical Hacking – Intro to Phishing, available at Free, has an average rating of 4.4, with 9 lectures, 2 quizzes, based on 124 reviews, and has 3485 subscribers.

Free Enroll Now

You will learn about Understand Phishing attacks and its implications Understand different types of Phishing attacks and its outcome Understand the tools used for Phishing attacks Understand how Phishing attacks are conducted This course is ideal for individuals who are Cyber Security Professionals or Penetration Testers or Red Teamers or Ethical Hackers It is particularly useful for Cyber Security Professionals or Penetration Testers or Red Teamers or Ethical Hackers.

Enroll now: Cyber Security, Ethical Hacking – Intro to Phishing

Summary

Title: Cyber Security, Ethical Hacking – Intro to Phishing

Price: Free

Average Rating: 4.4

Number of Lectures: 9

Number of Quizzes: 2

Number of Published Lectures: 9

Number of Published Quizzes: 2

Number of Curriculum Items: 11

Number of Published Curriculum Objects: 11

Original Price: Free

Quality Status: approved

Status: Live

What You Will Learn

  • Understand Phishing attacks and its implications
  • Understand different types of Phishing attacks and its outcome
  • Understand the tools used for Phishing attacks
  • Understand how Phishing attacks are conducted
  • Who Should Attend

  • Cyber Security Professionals
  • Penetration Testers
  • Red Teamers
  • Ethical Hackers
  • Target Audiences

  • Cyber Security Professionals
  • Penetration Testers
  • Red Teamers
  • Ethical Hackers
  • Introduction to Phishing

    Over the span of this course, you will be introduced to the concept of phishing, its types, and the technologies that enable it.

    Gain perspective from an attackers point of view to understand the purpose behind a phishing attack.

    We will also be looking at popular tools such as GoPhish and Evilginx, not forgetting the old school way of manually cloning a website to impersonate a legitimate service in order to perform credentials harvesting and also the cons of doing so.

    A short and quick introduction to phishing packed with practical examples!

    This course isn’t just about the ‘what’ and ‘how’; it focuses primarily on the ‘why’.

    By leveraging real-life examples from years of practical experience in the field, it provides an immersive learning experience that transcends conventional theoretical teaching.

    You’ll be given a window into the mind of the attacker, encouraging you to think like them, to understand their motivations and methods, and thereby learn to construct effective defensive strategies.

    Join this course to equip yourself with practical skills and a deep understanding of phishing attacks. Whether you are an aspiring cybersecurity professional, IT student, or just a curious individual, this course is an investment in knowledge that will enhance your digital literacy and security awareness.

    Course Curriculum

    Chapter 1: Introduction to Phishing

    Lecture 1: Course Introduction

    Lecture 2: What is Phishing?

    Lecture 3: Delivering the Phish

    Lecture 4: Purpose of the Phish

    Lecture 5: The Email Phish

    Lecture 6: What to use?

    Lecture 7: Impersonating Websites

    Lecture 8: Initial Access – Pwn

    Lecture 9: Summary and End

    Instructors

  • Cyber Security, Ethical Hacking Intro to Phishing  No.2
    Gemini Cyber Security
    Offensive Cyber Security Specialist
  • Rating Distribution

  • 1 stars: 2 votes
  • 2 stars: 4 votes
  • 3 stars: 14 votes
  • 4 stars: 45 votes
  • 5 stars: 59 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!