Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Unraveling and Countering Adversary-in-the-Middle (AiTM) Phishing Attacks

x33fcon via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
Dive into a comprehensive 43-minute conference talk that examines the critical landscape of Adversary-in-the-Middle (AiTM) phishing attacks and defense strategies. Learn about various AiTM phishing kits delivered as a Service model, including Evilproxy, NakedPages, Evilginx, OneDriveX, Greatness, and Caffeine, while understanding their features and how attackers use them to impersonate trusted entities. Explore real-world case studies of successful AiTM attacks, analyze attack patterns, and discover early warning signs for prompt threat identification. Master advanced detection and prevention techniques, including Automatic Attack Disruption, and gain practical insights into implementing robust security measures such as Conditional Access policy settings and phish-resistant MFA. Benefit from expert knowledge in analyzing AiTM phishing kits and developing innovative detection methods to effectively protect digital assets against these evolving cybersecurity threats.

Syllabus

2. Pawel Partyka: Unraveling and Countering Adversary-in-the-Middle Phishing Attacks

Taught by

x33fcon

Reviews

Start your review of Unraveling and Countering Adversary-in-the-Middle (AiTM) Phishing Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.