top of page

Phishing Email Forensics

Cyber Threat Intelligence & Incident Response Training.

Gain Work Experience!

Work Real SOC Shifts in Our 10-Day Bootcamp! Analyze real phishing emails, gain hands-on experience in Cyber Threat Intelligence and Incident Response. Master the skills to ace cybersecurity job interviews with real-world SOC shift experience.



Join our immersive 10-day live online SOC Analyst Training Bootcamp and master the art of phishing email analysis & Incident Response. This interactive program simulates a real SOC shift, empowering you to:

  • Investigate authentic phishing threats with hands-on exercises

  • Work in a virtual SOC, utilizing industry-leading tools and processes

  • Develop a robust portfolio of skills and technical expertise to take Incident response

  • Gain work experience to ace interviews and secure your ideal cybersecurity role



By the end of this intensive training, you'll be job-ready on Day 1, equipped to protect organizations from cyber threats and launch a successful SOC Analyst career. Enroll now and get ready to thrive in the world of cybersecurity!





Roadmap


Unit 1: Email Infrastructures and Components

  • The User-Submitted Phishing Email Analysis Process: From Submission to Analysis and Mitigation

  • Key Components of Email Infrastructure (Mail Servers, MTAs, MUAs)

  • Understanding Email Gateways, Spam Filters, and Security Appliances

  • Overview of Cloud-Based Email Services (e.g., Microsoft 365, Exchange)

  • Understanding the Basics of Phishing Emails and 

  • How Hackers Bypass Email Gateways

  • Hands-on: Mapping Out the Email Infrastructure of an Organization


Unit 2: How Email Works - Email Protocol

  • Overview of Email Communication Protocols (SMTP, IMAP, POP3)

  • How Emails are Sent and Received Across the Internet

  • The Role of Mail Servers and DNS in Email Delivery

  • Introduction to Encryption and Authentication Mechanisms in Email (e.g., TLS, SPF, DKIM, DMARC)

  • Practical Exercise: Tracing an Email’s Path Using Email Headers


Unit 3: Anatomy of an Email

  • Dissecting the Structure of an Email (Headers, & Body)

  • Uncovering the Tactics and Techniques Used in Phishing Attacks

  • Key Email Header Fields (From, To, Subject, Date, etc.) and Their Significance

  • Identifying and Interpreting Encoded Content

  • Hands-on: Analyzing the Anatomy of Sample Emails

 

Unit 4: Introduction to Phishing and Email Threats

  • Overview of Phishing: Types and Tactics

  • Understanding the Impact of Phishing on Organizations

  • Introduction to Phishing Email Analysis

  • Overview of the PhishMe Button in Outlook

  • Setting Up Tools and Platforms for Email Analysis

  • Practice Exercise: Threat Intelligence: Identifying Malware and Linking IOCs to Threat Actor


Unit 5: Analyzing Email Headers and Metadata

  • Understanding Email Headers: Structure and Key Fields

  • Analyzing Sender Information, Reply-To, and Received Fields

  • Identifying Spoofed Domains and Email Addresses

  • Investigating Email Routing and Source IP Addresses

  • Hands-on: Email Header Analysis Exercises


Unit 6: Investigating Email Content and Attachments

  • Techniques for Analyzing Email Body Content

  • Extract QR Code URLs in Emails

  • Static and Dynamic Analysis of Phishing URLs

  • Static and Dynamic Analysis of Phishing Attachments

  • Analyzing and Sandboxing Email Attachments

  • Identifying and Investigating Suspicious Email Payloads

  • Hands-on: Investigating Sample Phishing Emails


Unit 7: Correlating Phishing Emails with Threat Intelligence

  • Integrating Threat Intelligence with Email Analysis

  • Leveraging Threat Feeds to Enrich Phishing Email Data

  • Correlating User-Submitted Emails with Known Threat Actors

  • Building and Using Custom Threat Intelligence for Phishing Defense

  • Hands-on: Using Threat Intelligence to Investigate Phishing Emails


Unit 8: Incident Response for Phishing Emails

  • Developing an Incident Response Plan for Phishing Attacks

  • Prioritizing and Escalating Phishing Incidents

  • Containment and Remediation Strategies for Phishing Campaigns

  • Coordinating with SOC Teams and Management for Incident Response

  • Hands-on: Simulated Phishing Incident Response Exercise


Unit 9: Reporting, Best Practices, and Interview Preparation

  • Creating Effective Reports from Phishing Email Investigations

  • Resume Building

  • LinkedIn Profile Creation

  • Dice Profile Creation

  • Mock Interviews Focused on Phishing Analysis and Response

  • Final Q&A Session

  • Certification Test & Bootcamp Completion Ceremony

3-Weeks Live Bootcamp/SOC Shift Training

Start Date:

Monday, November 11, 2024

End Date:

November 29, 2024

Time:

6:30-9:30 PM ET

100% Money-Back Guarantee!

Program Tuition:

$400

bottom of page