SOC LEVEL 1
Ctrlk
  • Path 1
    • Cyber Defense Framework
  • PATH 2
    • Cyber Threat Intelligence
  • PATH 3
    • Network Security and Traffic Analysis
  • PATH 4
    • Endpoint Security Monitoring
  • PATH 5
    • Security Information and Event Management
  • PATH 6
    • Digital Forensics and Incident Response
  • PATH 7
    • Phishing
      • Phishing Analysis Fundamentals
      • Phishing Emails in Action
      • Phishing Analysis Tools
      • Phishing Prevention
      • The Greenholt Phish
Powered by GitBook
On this page
  1. PATH 7
  2. Phishing

Phishing Emails in Action

https://tryhackme.com/room/phishingemails2rytmuv

Resources:

LogoHow to stop your emails from being trackedThe Verge
LogoDOT File Extension - What is .dot and how to open? - ReviverSoftReviverSoft
LogoPolice warn of new Netflix email phishing scamConsumerAffairs
PreviousPhishing Analysis FundamentalsNextPhishing Analysis Tools

Last updated 3 years ago