Module_7: Phishing Attack Simulation

Uncategorized
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Phishing is a form of online fraud where attackers attempt to steal sensitive information such as passwords, credit card details, or bank account data by masquerading as a trustworthy entity. This is typically done through emails, messages, or websites that appear legitimate but are designed to deceive the victim

Learning Objectives

By the end of this module, learners will be able to:

  • Understand the fundamentals of phishing attacks and their real-world impact.
  • Identify different types of phishing techniques, including email-based and technical phishing simulations.
  • Analyze social engineering tactics used to manipulate individuals into revealing sensitive information.
  • Gain hands-on experience with interactive phishing labs and tools such as Blackeye.
  • Understand the process of data exfiltration through phishing attacks and its implications.

Learning Outcomes

After completing this module, learners will be able to:

  • Recognize and differentiate between various phishing attack methods.
  • Demonstrate the ability to simulate phishing attacks in controlled environments for learning purposes.
  • Evaluate and mitigate risks associated with social engineering attacks.
  • Use tools like Blackeye to understand phishing attack mechanisms and defense strategies.
  • Analyze how phishing leads to data exfiltration and apply preventive security measures.

Total Duration for Module Completion : 6 Hours

Show More

Course Content

Pre session Quiz

  • Pre Session Quiz

7.1 Phishing Overview

7.2 Technical Phishing simulation

7.3 Social Engineering Attacks

7.4 Interactive Phishing Lab

7.5 Blackeye phishing

7.6 Phishing Exfiltration Lab

post Session Quiz

Student Ratings & Reviews

No Review Yet
No Review Yet