This class teaches new security analysts the basics of responding to phishing attempts. Students will
start with a primer in command-line basics and network flow concepts, then learn how to reconstruct
the path taken by emails, how to analyze email headers for security issues, how to generate indicators
of compromise from suspicious emails, and what the effects can be from a successful phish on
systems and networks.
Learning Objectives
Successful completion of this course will enable students to:
- Analyze flows of network traffic
- Describe the protocols and infrastructure used to send and receive email
- Analyze email messages and other network traffic for signs of phishing
- Identify and observe the core components of an operating system
- Conduct basic behavioral analysis of malware on a running Windows system