Fruits of Learning
Ctrlk
  • Overview
  • Tools & Cheatsheets
  • Hacking Methodology
  • Hands-on Practice
  • Changelog
  • Courses
    • 📦Hack The Box
    • 🕴️OffSec
    • 💸SANS
    • 🛡️Security Blue Team
      • 1️⃣Blue Team Level 1
        • Introduction
        • Security Fundamentals
        • Phishing Analysis
          • Introduction to Phishing and Emails
          • Types of Phishing Emails
          • Tactics and Techniques Used
          • Investigating a Phishing Email
          • Analyzing Artifacts
          • Taking Defensive Actions
          • Report Writing
        • Threat Intelligence
        • Digital Forensics
        • Security Information and Event Monitoring
        • Incident Response
        • BTL1 Exam Preparation
Powered by GitBook
On this page
Edit
  1. Courses
  2. 🛡️Security Blue Team
  3. 1️⃣Blue Team Level 1

Phishing Analysis

This section will teach you how to combat phishing, from receiving a suspicious email through to taking defensive measures.

Introduction to Phishing and Emails

Types of Phishing Emails

Tactics and Techniques Used

Investigating a Phishing Email

Analyzing Artifacts

Taking Defensive Actions

Report Writing

PreviousActive DirectoryNextIntroduction to Phishing and Emails

Last updated 4 months ago