Security Blue - Phishing Analysis

This class was created by Brainscape user ola sijuwola. Visit their profile to learn more about the creator.

Decks in this class (62)

Introduction to Phishing and Emails
Introduction,
Learning objectives,
How email works
6  cards
Anatomy of an Email
Email header,
Email body
4  cards
What is Phishing?
Impact of phishing,
Further reading
4  cards
Types of Phishing Emails
Learning objectives
2  cards
Recon
Recon emails explained,
Tactics used
6  cards
Credential Harvester
Amazon themed harvester,
Microsoft themed harvester
4  cards
Social Engineering
1  cards
Vishing and Smishing
Smishing,
Vishing
4  cards
Whaling
1  cards
Malicious File
Malicious attachments,
Hosted malware
3  cards
SPAM
Example email 1
5  cards
False Positive
1  cards
Video: Types of Phishing Attacks and Examples
Video transcript
1  cards
Lab) Categorizing Phishing Emails Solution
Question 1 email one what categor...,
Question 2 email two what categor...,
Question 3 email three what categ...
5  cards
Tactics and Techniques Used
Introduction,
Learning objectives,
Spear phishing
4  cards
Impersonation
1  cards
Typosquatting and Homographs
Typo squatting,
Example walkthrough
4  cards
Sender Spoofing
How does spoofing work,
Example workthrough
3  cards
HTML Styling
Html styling,
Html styling contd
4  cards
Email Attachments
Email attachments,
Social engineering files,
Lure documents
4  cards
Hyperlinks
Hyperlinks,
Example walkthrough
2  cards
URL-Shortening Services
Url shorteners,
Using url shorteners,
7  cards
Use of Legitimate Services
Email delivery,
File hosting
3  cards
Business Email Compromise
What is bec
2  cards
Investigating a Phishing Email
Introduction,
Learning objectives
2  cards
Artifacts to Collect
Artefacts to collect,
Email artifacts,
File artifacts
4  cards
Manual Collection - Email Artifacts
Email artifacts,
Email artifact list,
Email client extraction
7  cards
Manual Collection - Web Artifacts
Email client extraction,
Text editor extraction
3  cards
Manual Collection - File Artifacts
Hashes via powershell,
5  cards
Video) Manually Collecting Artifacts
Video transcript
1  cards
Automated Collection With PhishTool
Example 1,
6  cards
Video) Automatically Collecting Artifacts
Video transcript
1  cards
Lab) Manual Artifact Extracton Solution
Lab overview,
Question 1 email one what is the ...,
Question 2 email one what is the ...
15  cards
Analyzing Artifacts
0  cards
Visualization Tools
Url2png,
Urlscan
4  cards
URL Reputation Tools
Artifact repudiation tools,
Virustotal,
Urlscan
5  cards
File Reputation Tools
Virustotal,
Talos file repudiation
4  cards
Malware Sandboxing
Hybrid analysis,
Hybrid analysis contd
5  cards
Video) Manual Artifact Analysis
Video transcript
1  cards
Automated Artifact Analysis
Artifact analysis phishtool,
File artifact analysis,
Web artifact analysis
4  cards
Video) Artifact Analysis With PhishTool
Video transcript
1  cards
Taking Defensive Actions
Learning objectives,
Preventative marking external emails
7  cards
Preventative: Email Security Technology
Anti spoofing records,
Spf records
6  cards
Preventative: Spam Filter
Why is it important,
Types of spam filters
6  cards
Preventative: Attachment Sandboxing
1  cards
Preventative: Security Awareness Training
Awareness training,
Simulated phishing attacks
3  cards
Reactive: Immediate Response Process
Immediate response process
1  cards
Reactive: Blocking Email Artifacts
Blocking email artifacts,
Email sender,
Sender domain
4  cards
Reactive: Blocking Web Artifacts
Blocking web artifacts,
Web proxy,
Dns blackholing
5  cards
Reactive: Blocking File Artifacts
Blocking file artifacts,
Blocking hashes,
Blocking names
3  cards
Reactive: Informing Threat Intelligence Team
Informing threat intelligence team,
Sustained campaign,
Targeted attack
5  cards
Report Writing
0  cards
Email Header, Artifacts, and Body Content
Header artifacts and body content,
Email header and artifacts,
Email body content
5  cards
Analysis Process, Tools, and Results
Analysis process,
Example 1,
Example 2
4  cards
Defensive Measures Taken
Defensive measures taken,
Example 1,
Example 2
3  cards
Artifact Sanitization
Sanitizing artifacts
1  cards
Activity) Report Writing Exercise
Report writing exercise,
Challenge brief
2  cards
Activity) Report Writing Answers
Report writing exercise,
Challenge answers
2  cards
Phishing Response Challenge
Learning objectives
2  cards
Video) Phishing Response Walkthrough
Video transcript
1  cards
Phishing Response Brief
Challenge brief,
Hints and advice
3  cards
Lab) Phishing Response Challenge Solution
Question 1 which of the 5 emails ...,
Q1 contd
23  cards

More about
Security Blue - Phishing Analysis

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study ola sijuwola's Security Blue - Phishing Analysis flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Business System Analysis
  • 29 decks
  • 762 flashcards
  • 4 learners
Decks: Quiz 1 Part 1 M1s1, Quiz 1 Part 2 M1s1, Quiz 1 Part 3 M1s1, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
Make Flashcards