GoPhish 101

$30.00

Boost your cybersecurity expertise and explore new phishing techniques, this course offers the step-by-step guidance you need.

Out of stock

Description

Module 1: Introduction to Phishing and Ethical Usage

    • 1.1 What is Phishing
    • 1.2 Ethical and Legal Considerations
    • 1.3 Overview of GoPhish

Module 2: Setting Up GoPhish

    • 2.1 Installing GoPhish
    • 2.2 Configuring the Admin Interface and Server with SSL
    • 2.3 Overview of GoPhish Features and Dashboard
    • 2.4 Setting Up Email Servers for Phishing Campaigns
      • Configuring SMTP
      • Setting SPF, DKIM, and DMARC for Deliverability
    • 2.5 Troubleshooting Common Issues

Module 3: Creating Phishing Campaigns with GoPhish

    • 3.1 Designing Custom Email Templates
    • 3.2 Crafting Effective Landing Pages
    • 3.3 Importing and Managing Target Users
    • 3.4 Launching and Monitoring Campaigns
    • 3.5 Analyzing Campaign Results: Key Metrics

Module 4: Introduction to Evilginx

    • 4.1 What is Evilginx?
    • 4.2 Setting Up Evilginx on a Linux Server
    • 4.3 Configuring Domains and DNS for Evilginx
    • 4.4 Creating and Customizing Phishlets
    • 4.5 Proxying Real Websites: Risks and Benefits

Module 5: Integrating GoPhish with Evilginx

    • 5.1 Scenarios for Integration
    • 5.2 Sending GoPhish Links to Evilginx Landing Pages
    • 5.3 Capturing Credentials and Session Tokens
    • 5.4 Managing Data Flow Between GoPhish and Evilginx
    • 5.5 Demonstration: A Complete Phishing Workflow

Module 6: Building a Testing Lab

    • 7.1 Setting Up a Local GoPhish Instance
    • 7.2 Configuring Evilginx in a Controlled Environment
    • 7.3 Using Virtual Machines for Target Simulation
    • 7.4 Testing Phishing Scenarios Safely

Module 7: Defending Against Phishing

    • 8.1 Recognizing Phishing Techniques
    • 8.2 Educating Employees Using GoPhish Data
    • 8.3 Implementing Security Controls to Detect Evilginx-like Attacks
    • 8.4 Real-World Case Studies: Attack vs. Defense

Module 8: Course Wrap-Up

    • 9.1 Summary of Key Learnings
    • 9.2 Q&A and Troubleshooting Common Problems
    • 9.3 Next Steps: Applying Skills in Real Environments
    • 9.4 Access to Additional Resources and Updates

Module 9: Bonus Content

    • 10.1 Using APIs with GoPhish for Automation
    • 10.2 Monitoring GoPhish Campaigns with Custom Dashboards
    • 10.3 Ethical Hacking Certifications and Career Path Guidance

…and much more!


Additional Support

Join a Community: Once you complete the course, you won’t be left on your own. You can always connect with me through:

Feel free to ask any questions, and I’ll provide detailed answers to ensure your understanding. For those who value privacy in their queries, I offer 1-on-1 discussion sessions to address your concerns directly and discreetly.

This is more than just a course; it’s your path to becoming a cybersecurity expert. Let’s get started today!

Note: Access details will be sent to the email registered with your account.

Disclaimer:
The use of Material should comply with all applicable laws and regulations. This course is intended for educational purposes only. The user assumes all responsibility for any consequences arising from the use of Material.

0
    0
    Your Cart
    Your cart is emptyReturn to Shop