21 days ago
You’ll learn how attackers gather information on their targets and what information available online is useful for them.
You’ll find out how to secure Red Team infrastructure, prepare an efficient payload, and bypass security solutions.
You’ll also cover best practices for reporting and discover how to use what you’ve learned on this course to protect the cybersecurity infrastructure of your company or organization.
Course syllabus
Course syllabus
This hands-on, interactive 1 Day Social Engineering & Phishing Mastery Course consists of 4 Modules packed with useful and current information directly from the field that will prepare you for any possible cyber threat.
- Module 1: Reconnaissance
- 1. Preparing phishing campaigns
- 2. Open Source Intelligence (OSINT)
- 3. Google hacking and search engines
- 4. Targeted phishing and social media
- 1. Preparing phishing campaigns
- 1. Command and Control (C2)
- 2. Stealth Communication
- 3. Setting up DNS and certificates
- 4. Credential harvesting with Evilginx2
- 5. Automating mass-mailing
- 6. Securing your Red Team infrastructure
- 1. Malicious VBA macros
- 2. Malicious XLM macros
- 3. Living off the Land Binaries and Scripts
- 4. Multi-stage malware
- 5. Persistency techniques and attacks on supply chain
- 6. Fileless malware
- 7. Utilizing malicious hardware tools
- 1. Measuring campaign results
- 2. Measuring campaign results
- 3. Protecting your organization
![[Image: tumblr-b540b318feeef992063cb2e5ff500a57-...resize.gif]](https://i.postimg.cc/jjkLFCGZ/tumblr-b540b318feeef992063cb2e5ff500a57-68426a28-1280-ezgif-com-resize.gif)