1. Introduction to Phishing
1. Introduction to Phishing.txt
2. Email Fundamentals
3. Phishing Analysis Configuration
3. Phishing Analysis Configuration.txt
4. Phishing Attack Types
5. Phishing Attack Techniques
5. Phishing Attack Techniques.txt
6. Email Analysis Methodology
7. Email Header and Sender Analysis
7. Email Header and Sender Analysis.txt
8. Email Authentication Methods
9. Email Content Analysis
10. The Anatomy of a URL
11. Email URL Analysis
11. Email URL Analysis.txt
12. Email Attachment Analysis
12. Email Attachment Analysis.txt
13. Dynamic Attachment Analysis and Sandboxing
13. Dynamic Attachment Analysis and Sandboxing.txt
14. Static MalDoc Analysis
14. Static MalDoc Analysis.txt
15. Static PDF Analysis
15. Static PDF Analysis.txt
16. Automated Email Analysis with PhishTool
17. Reactive Phishing Defense
17. Reactive Phishing Defense.txt
18. Proactive Phishing Defense
19. Documentation and Reporting
19. Documentation and Reporting.txt
20. Phishing Analysis Challenge 1.txt
21. Phishing Analysis Challenge 2.txt
22. Phishing Analysis Challenge 3.txt
23. Additional Practice