Defend against Phishing Attacks
Description
Do you want to improve your cyber security?
In this course you will learn about phishing attacks. Phishing attacks attempts to trick users into stealing their information. They may thin invoices are real, because the attacker sends official looking E-mails. But instead, it has a phony link. The link will take users to a phishing website where they will be prompted to fill out the web form with their sensitive information. Besides email phishing, there are other distribution methods being used too like text message phishing, social media phishing and so on.
This is a beginners course that will teach you how a phishing attack works and how you can defend against it. You will learn how this attack works behind the scenes. About the risks that are involved with phishing attacks and more. Throughout the course we will use Kali Linux, a computer system designed for Cyber Security. But, no Linux experience is required for doing this course. You will learn how phishing works from both the red team (attacker) and blue team (defense) perspective.
If you want to learn more about Cyber Security, this course is for you. You will learn to defend against one of the most common types of attacks.
Who this course is for:
- Beginner Software Developers
- Beginner Ethical Hackers
- Beginner Security Professionals