Practical Phishing Campaigns

This immersive course delves into practical phishing tactics, equipping cybersecurity professionals with the knowledge to perform professional phishing engagements.

Training for a team or organization? Contact us about group access.

Practical Bug Bounty

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Beginner
  • Duration: 3h
  • Access: Included in Membership

Overview

This specialized and comprehensive course is designed to provide an in-depth understanding of cybersecurity practices, with a focus on ethical hacking techniques to safeguard digital infrastructure. Through a series of detailed modules, participants will delve into modern security architectures, learn how to set up and manage phishing simulations using tools like GoPhish, bypass multi-factor authentication with Evilginx, and explore advanced phishing and vishing strategies. The curriculum also covers essential setup procedures for domain and email registration, configurations for AWS EC2 instances, and the use of SMS phishing (smishing) for security testing. Furthermore, the course emphasizes the importance of reporting, documentation, and ethical considerations in cybersecurity operations.

Objectives

Protect Against Digital Threats:

  • Gain a thorough understanding of modern cybersecurity and ethical hacking principles to protect against digital threats.

Operate Phishing Simulation Tools:

  • Learn the setup and configuration of phishing simulation tools, including GoPhish and Evilginx, for cybersecurity training and testing.

Learn Phishing Techniques:

  • Master techniques for bypassing multi-factor authentication, implementing domain and email spoofing, and deploying SMS phishing campaigns.

Defend Against Phishing:

  • Acquire skills in hardening cybersecurity measures, customizing phishing campaigns, and employing vishing strategies for comprehensive security assessments.

Perform Professional Cybersecurity Operations:

  • Understand the importance of clean-up practices, event logging, and detailed reporting for maintaining ethical standards and ensuring accountability in cybersecurity operations.

System Requirements

  • Access to a computer with internet connectivity capable of running virtual machines for tool setup and simulations.
  • Basic familiarity with command-line interfaces, networking concepts, and cybersecurity fundamentals is recommended for an optimal learning experience.

Recommended For

  • Cybersecurity professionals seeking to enhance their skills in ethical hacking and digital defense strategies.
  • IT personnel tasked with safeguarding organizational digital assets and interested in practical, hands-on approaches to cybersecurity.
  • Individuals pursuing a career in cybersecurity, aiming to gain proficiency in contemporary ethical hacking tools and techniques.
  • Security consultants looking to expand their toolkit with advanced phishing and social engineering strategies.

Course Curriculum

  • The Perimeter – A Cat and Mouse Game
    • About Me
    • About the Course
    • An Important Announcement
    • Today’s Perimeter
    • Modern Security Architecture
    • Phishing Domains Advice
    • Multi-Factor Authentication Advice
    • Spam Filters Avoidance Advice
    • Whitelisting Advice
  • Domain Registration
    • Domain Registrar Options
    • Amazon AWS Route 53 Setup
  • Email Registration
    • Email Registrar Options
    • Mailgun Setup
  • Gophish – Basic Phishing
    • Creating an AWS EC2 Instance
    • GoPhish Setup
    • Configuring Gophish as a System Service
    • Configuring TLS Certificates
    • Email Sending Profile Setup
    • Sending Our First Campaign
  • Gophish – Hardening and Advanced Techniques
    • Hardening Our Server
    • Email Sender Hardening
    • Custom HTML for Emails
    • Custom HTML for Landing Pages
    • Forgot your Password? Do This
    • GoPhish Setup in a Nutshell
  • Evilginx – MFA Bypass
    • Evilginx Setup
    • DNS Fixes
    • Running Evilginx
    • Setting Up Domains For Phishlets
    • Running a Custom Phishlet
    • Combining the Power of Gophish and Evilginx
    • Protecting Evilginx
    • Evilginx Setup in a Nutshell
  • Evilgophish – SMS Phishing
    • Warning: Twillio Changes
    • Evilgophish Setup
    • Evilgophish Admin Setup
    • Evilgophish Evilginx Setup
    • Twillio Setup
    • Sending Our Smish
  • Vishing Strategies
    • Vishing SMSing Advice
  • Reporting, Documentation, and Cleaning Up
    • Tips for Defenders
    • Cleaning Up Our Domains
    • Gophish Event Logs
    • Reporting and Documentation
  • Thank You!
    • Thanks!

This Course Is Included in Your All-Access Membership

One membership gives you ongoing access to Practical Phishing Campaigns, every other paid Academy course, and an active community of learners and mentors in Discord.

INSTRUCTORS

Meet Your Instructor

Learn from industry experts with real-world cybersecurity experience.

Instructor Aaron Wilson

Aaron Wilson

Aaron is a passionate security professional with experience in the Fortune 50. He is a Principal Penetration Tester at TCM Security, responsible for Mobile Application Penetration Testing of over 20 Mobile Apps. He is also an avid Capture the Flag Creator and has published multiple rooms on TryHackMe. Aaron is also CEO and Founder of the Wilson Security Group and publishes videos on YouTube on security topics and cybersecurity certification reviews.

Aaron holds certifications such as the eMAPT, CISSP, eCPPTv2, eWAPTv2, CEH, and eJPT certifications among others. He holds a bachelor’s degree in Security and Risk Analysis from Penn State University as well as a Master’s in Information Assurance and Cybersecurity from Western Governor’s University (WGU).

FAQS

Common Questions

Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

Can I get a refund if I'm unhappy with my purchase?
2
3

Yes. All courses come with a 24-hour money-back guarantee.

Will I receive a certificate of completion when I finish a course?
2
3

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?
2
3

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Membership?
2
3

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

What if you already own courses on TCM Academy?
2
3

If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

I can see the course, but it won’t load or play. What should I do?
2
3

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

This course is included in our All-Access Membership, starting at $29.99/month.

Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

Ready to level up your Cybersecurity Career?

Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

PWPA