15
What to expect?
Different Types of Phish in the Sea
Introduction to the Mind of a Hacker
Threat Actors
The Process of a Hacker
Picking the Low Hanging Fruit
Reconnaissance - Getting to Know Your Target Intimately
Designing the Scenario - Part 1
Designing the Scenario - Part 2
Designing the Scenario - Part 3
Building the Phish
Exploit - Getting Our Profit
An hacker's view on how to defend yourself
COMING SOON
COMING SOON

instructor