Mastering Phishing Email Analysis: Incident Response
ฝัง
- เผยแพร่เมื่อ 25 ต.ค. 2023
- In this comprehensive video, we delve into the world of phishing email analysis and incident response. Learn how to recognize, analyze, and effectively respond to phishing attacks. Discover key techniques, tools, and best practices for enhancing your cybersecurity posture. Stay informed and protected against evolving threats in the digital landscape. Subscribe for more valuable insights and tutorials on cybersecurity and threat mitigation.
🔴 Subscribe to our channel to get video updates. Hit the subscribe button above: bit.ly/44og0QB
📝Feel free to share your comments below.📝
For Real-time Cyber Security Trainings related enquiries contact us on : +91-9108318017 Email: trainings@siemxpert.com
🔵 SIEM XPERT 𝐎𝐧𝐥𝐢𝐧𝐞 𝐓𝐫𝐚𝐢𝐧𝐢𝐧𝐠 𝐚𝐧𝐝 𝐂𝐞𝐫𝐭𝐢𝐟𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬
🔥Real-time SOC Analyst Training and Certification with LAB Access: www.siemxpert.com/soc-analyst...
🔥Real-time Splunk Admin and Splunk Enterprise Security Training with LAB Access: www.siemxpert.com/splunk-admi...
🔥Real-time CrowdStrike EDR and XDR Training with LAB Access: www.siemxpert.com/CrowdStrike...
🔥Microsoft Azure Sentinel Training with LAB Access: www.siemxpert.com/azure-senti...
🔥 Real-time IBM Qradar SIEM Training with LAB Access: www.siemxpert.com/qradar-trai...
🌕 Follow us in Social Media
📌𝐋𝐢𝐧𝐤𝐞𝐝𝐈𝐧: bit.ly/3YO1FeU
📌𝐅𝐚𝐜𝐞𝐛𝐨𝐨𝐤: bit.ly/47HLqUO
📌𝐈𝐧𝐬𝐭𝐚𝐠𝐫𝐚𝐦: bit.ly/3ON69Ot
📌Google: bit.ly/3soSNk5
🔴About SIEM XPERT Cyber Security Training
8+ YEARS OF EXCELLENCE IN CYBER SECURITY TRAINING & SERVICES
SIEM XPERT is the Global leader in Cyber Security Trainings and services, we are in operations since 2015, As global market is having cyber security resources crunch hence our mission is to fulfill those open position by generating ready to deploy cyber security resources and give them real-time practical hands-on experience with the help of world class Cyber Security Lab, We are also training people who are working on some other field and want to switch their career to high paying, high demanding field of cyber security.
#PhishingAnalysis #IncidentResponse #EmailSecurity #Cybersecurity #PhishingThreats #ThreatAnalysis #CyberDefense #EmailProtection #CyberSecurityTips #MalwareDetection #SecurityAwareness
#OnlineSafety #malwareanalysis #socanalyst #cybersecurity #socanalysttraining #siemxpert
Thank you Everyone for joining, Kindly like l, Subscribe and comment on the videos, for the wider visibility.
Great explanation. Need more such videos on Incident response.
Great session, happened to learn about phishing email analysis using multiple tools. Done. Thank you!
Thanks alot sulabh it helps alot to understand and very clear even to me who has hardly learnt basics of cybersecurity till now. Great work
Very very valuable class on phishing analysis, Thanks alot sir
Great Session Sir.
Thank you so much for this.
Thankyou for sharing your valuable insight.
Glad to be here sulabh sir
Good information. Thanks for the valuable knowledge
Very detailed analysis. Great lesson
Thank u for detailed information
Thanks sir for clearing the whole concept for how to do Sandboxing after receiving phishing mail 🙏🙏🙏🙏
Great video about Incident response. It would be good if we have more videos related to other types of Analysis as well as Threat Hunting, Ransomware, etc.
Thanks for sharing
❤ Expecting more contents like this
Thanks a lot sir .......😇
Thankyou so much sir
Thanks 🙏
Thanks sir for this session
Great content,
Tq u sir 🎉
We can check the IP of a domain but is there any way to get the domain name against the reverse lookup of IP instead of getting the hosted domain host name can we get the list of domains hosted on that host ? something like that in investigating the SIEM logs
1:07:15 We can use hash calc software for calculate hash
Brother, sound of y intro is amazing
Ty sir
Nice
thank you sir for this most useful information ,
i am waiting for another attack analysis video like ransomewar, spyware and bruteforse
i have well understood how to analyze an email for malware thanks for the great session
Can you give me a summary
hats off for your explanation
Thank you for sharing your learning experience 😊
Sir pls do videos on different cyber attacks
what about email filtering rules?
Kindly upload the video for Ransomeware and DDOs analysis
Thank you. Pls share the documents
Which RAM version is mentioned at the top? Jat Siga RAM? is it different than DDR 4 or 5 version?
Whats the bus speed for that what its relevance with the Phishing Email, Please explain I didn't get it.
Jai siya ram🙏🏻
@@harshgupta1911 which RAM is this?
Sir , please one video on Malware analysis also ..
Can anyone please give me a summary urgently needed
Please how do i attend your training?
Contact on +91 91083 18017 for complete information
Sir! I haven't understood the part why phishing email isn't blocked by email security gateway.. what signature you are talking about?
Delayed Signature Updates: For gateways that rely heavily on signatures or blacklists, there can be a delay between a new phishing campaign launch and the update of these lists. During this delay, phishing emails may not be recognized by the security system. Now understood sir ! thank you
Hello Everyone🖐️
Hello sir
Please turn off your mic when only if you have a question turn it on
please change your intro music (noise) it horrible
Ok.. in the next video we will change it..
@@siemxpert thank you so much. I am new to your channel. Your videos are awesome and informative. Keep educating. Thanks