Phishing Email Forensics
Cyber Threat Intelligence & Incident Response Training.
Gain Work Experience!
Work Real SOC Shifts in Our 10-Day Bootcamp! Analyze real phishing emails, gain hands-on experience in Cyber Threat Intelligence and Incident Response. Master the skills to ace cybersecurity job interviews with real-world SOC shift experience.
Join our immersive 10-day live online SOC Analyst Training Bootcamp and master the art of phishing email analysis & Incident Response. This interactive program simulates a real SOC shift, empowering you to:
Investigate authentic phishing threats with hands-on exercises
Work in a virtual SOC, utilizing industry-leading tools and processes
Develop a robust portfolio of skills and technical expertise to take Incident response
Gain work experience to ace interviews and secure your ideal cybersecurity role
By the end of this intensive training, you'll be job-ready on Day 1, equipped to protect organizations from cyber threats and launch a successful SOC Analyst career. Enroll now and get ready to thrive in the world of cybersecurity!
Roadmap
Unit 1: Email Infrastructures and Components
The User-Submitted Phishing Email Analysis Process: From Submission to Analysis and Mitigation
Key Components of Email Infrastructure (Mail Servers, MTAs, MUAs)
Understanding Email Gateways, Spam Filters, and Security Appliances
Overview of Cloud-Based Email Services (e.g., Microsoft 365, Exchange)
Understanding the Basics of Phishing Emails and
How Hackers Bypass Email Gateways
Hands-on: Mapping Out the Email Infrastructure of an Organization
Unit 2: How Email Works - Email Protocol
Overview of Email Communication Protocols (SMTP, IMAP, POP3)
How Emails are Sent and Received Across the Internet
The Role of Mail Servers and DNS in Email Delivery
Introduction to Encryption and Authentication Mechanisms in Email (e.g., TLS, SPF, DKIM, DMARC)
Practical Exercise: Tracing an Email’s Path Using Email Headers
Unit 3: Anatomy of an Email
Dissecting the Structure of an Email (Headers, & Body)
Uncovering the Tactics and Techniques Used in Phishing Attacks
Key Email Header Fields (From, To, Subject, Date, etc.) and Their Significance
Identifying and Interpreting Encoded Content
Hands-on: Analyzing the Anatomy of Sample Emails
Unit 4: Introduction to Phishing and Email Threats
Overview of Phishing: Types and Tactics
Understanding the Impact of Phishing on Organizations
Introduction to Phishing Email Analysis
Overview of the PhishMe Button in Outlook
Setting Up Tools and Platforms for Email Analysis
Practice Exercise: Threat Intelligence: Identifying Malware and Linking IOCs to Threat Actor
Unit 5: Analyzing Email Headers and Metadata
Understanding Email Headers: Structure and Key Fields
Analyzing Sender Information, Reply-To, and Received Fields
Identifying Spoofed Domains and Email Addresses
Investigating Email Routing and Source IP Addresses
Hands-on: Email Header Analysis Exercises
Unit 6: Investigating Email Content and Attachments
Techniques for Analyzing Email Body Content
Extract QR Code URLs in Emails
Static and Dynamic Analysis of Phishing URLs
Static and Dynamic Analysis of Phishing Attachments
Analyzing and Sandboxing Email Attachments
Identifying and Investigating Suspicious Email Payloads
Hands-on: Investigating Sample Phishing Emails
Unit 7: Correlating Phishing Emails with Threat Intelligence
Integrating Threat Intelligence with Email Analysis
Leveraging Threat Feeds to Enrich Phishing Email Data
Correlating User-Submitted Emails with Known Threat Actors
Building and Using Custom Threat Intelligence for Phishing Defense
Hands-on: Using Threat Intelligence to Investigate Phishing Emails
Unit 8: Incident Response for Phishing Emails
Developing an Incident Response Plan for Phishing Attacks
Prioritizing and Escalating Phishing Incidents
Containment and Remediation Strategies for Phishing Campaigns
Coordinating with SOC Teams and Management for Incident Response
Hands-on: Simulated Phishing Incident Response Exercise
Unit 9: Reporting, Best Practices, and Interview Preparation
Creating Effective Reports from Phishing Email Investigations
Resume Building
LinkedIn Profile Creation
Dice Profile Creation
Mock Interviews Focused on Phishing Analysis and Response
Final Q&A Session
Certification Test & Bootcamp Completion Ceremony