20,95 €
20,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
10 °P sammeln
20,95 €
20,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
10 °P sammeln
Als Download kaufen
20,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
10 °P sammeln
Jetzt verschenken
20,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
10 °P sammeln
  • Format: PDF

Every organization and email account is susceptible to phishing messages. Phishing messages vary vastly in sophistication, but the core skills and process to analyze a suspicious message does not change.
Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for well over 20 years. This attack method has been rapidly growing in popularity and continues to be the number one infection vector that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will…mehr

Produktbeschreibung
Every organization and email account is susceptible to phishing messages. Phishing messages vary vastly in sophistication, but the core skills and process to analyze a suspicious message does not change.

Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for well over 20 years. This attack method has been rapidly growing in popularity and continues to be the number one infection vector that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool currently exists.

How to Catch a Phish will train individuals from all walks of life and technical backgrounds to detect, investigate, and respond to the number one infection vector today. The repeatable process described here has been cultivated and tested in real-life incidents and has been validated across multiple threat landscapes and environments.

The book teaches readers how to analyze suspicious messages using open source tools and resources. The reader will understand the basics of email, tactics used by attackers, and a repeatable process to systematically check messages for suspicious activity.

What you'll learn

  • How email messages work
  • What information is in an email header
  • Key indicators of a suspicious or malicious email message
  • Tactics used in phishing emails by attackers
  • Review header information and pull out key indicators or signatures
  • Safely extract and analyze email links and attachments
  • How to use a variety of open source and freely available tools to analyze email messages
  • How to save messages as attachments for analysis


Who This Book Is For

This book is beneficial to nearly every person with an email account. That number is large, but the main readers will likely be cybersecurity professionals and enthusiasts. These individuals currently hold or aspire to obtain positions such as IT Security Analyst, Network Defender, SOC Analyst, Help Desk Technician. The audience likely has a general understanding of how email works and some ways that attackers use this platform for initial access.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Nick Oles is a cybersecurity expert with over 15 years of operational experience in military, industry, and academic environments. He has worked on incident response and threat hunting teams and consulted with Fortune 150 organizations, small businesses, and US Department of Defense entities. Nick has served his country for over a decade in the cyber and special operations communities, earning multiple military accolades, completing worldwide deployments, and serving in joint special operations environments. He has advised award-winning academic centers on cyber-program development and management, as well as created and taught academic and certification courses on a variety of cybersecurity topics. Nick has detected, analyzed, and responded to thousands ofsecurity incidents over his career. He continues to actively contribute to the cybersecurity community and teach students at all skill levels while still serving his country.