Overview
This course covers the psychology of phishing and real-world attacks conducted against a tech company. It includes techniques to prevent credential phishing, recent technological advancements, and case studies. The course teaches about attack vectors, domain protections, phishing examples, and cryptographic authentication. The teaching method involves a series of real-world examples and case studies. The intended audience for this course includes individuals interested in cybersecurity, particularly in the area of phishing prevention and mitigation.
Syllabus
Introduction
What is phishing
Psychology of phishing
System 1 vs System 2
Attack vectors
Credentialbased phishing
Realworld examples
Domain protections
Phishing examples
Plain text vs HTML
Phishing pages
SMS 2FA
Phishing Training
Depressing Industry State
Whats the Point
Cryptographic Authentication
U2F
SSO
Limitations
Google Docs
Conclusion
Taught by
NorthSec