Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Initial Access with Gophish

Course Cover
compare button icon

Course Features

icon

Duration

30 minutes

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Intermediate

icon

Teaching Type

Self Paced

icon

Video Content

30 minutes

Course Description

This course is designed to teach you how to effectively use Gophish for phishing campaigns and gaining initial access in a red team environment. You will learn how to install and navigate Gophish, as well as various social engineering techniques to create malicious link phishing campaigns and obtain credentials. Additionally, you will learn how to execute a malicious attachment attack to gain access to your target. By the end of this course, you will have the knowledge and skills to successfully perform spearphishing with Gophish.

Course Overview

projects-img

International Faculty

projects-img

Post Course Interactions

projects-img

Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

, you’ll discover how to simulate a malicious attachment attack to gain access to your target

, you’ll explore social engineering techniques to execute a malicious link phishing campaign and capture credentials

, you’ll see how to install gophish and navigate through its features

In this course, , you’ll cover how to utilize gophish to complete initial access in a red team environment

When you’re finished with this course, you’ll have the skills and knowledge to execute this technique - t1566 spearphishing using gophish

Course Cover