TCM – Practical Phishing Campaigns
English | Tutorial | Size: 536.06 MB
This specialized and comprehensive course is designed to provide an in-depth understanding of cybersecurity practices, with a focus on ethical hacking techniques to safeguard digital infrastructure. Through a series of detailed modules, participants will delve into modern security architectures, learn how to set up and manage phishing simulations using tools like GoPhish, bypass multi-factor authentication with Evilginx, and explore advanced phishing and vishing strategies. The curriculum also covers essential setup procedures for domain and email registration, configurations for AWS EC2 instances, and the use of SMS phishing (smishing) for security testing. Furthermore, the course emphasizes the importance of reporting, documentation, and ethical considerations in cybersecurity operations.
Syllabus
The Perimeter – A Cat and Mouse Game
Domain Registration
Email Registration
Gophish – Basic Phishing
Gophish – Hardening and Advanced Techniques
Evilginx – MFA Bypass
Evilgophish – SMS Phishing
Vishing Strategies
Reporting, Documentation, and Cleaning Up
Thank you!
RAPIDGATOR:
rapidgator.net/file/fd8026980148fa1eb858719915bca0d4/Practical_Phishing_Campaigns.rar.html
TURBOBIT:
tbit.to/xdbqobd9g5ih/Practical%20Phishing%20Campaigns.rar.html