Learn the amazing art of phishing to get past network security

MCSI Knowledge Test

Phishing and Spear-Phishing

Phishing and spear-phishing are types of cyber attacks that involve tricking victims into clicking malicious links or opening attachments that install malware. These attacks are often carried out by email, but can also occur through instant messages, social media, and text messages. Phishing attacks are a major threat because they can be used to steal sensitive information, such as login credentials and financial information. Spear-phishing attacks are even more dangerous because they are targeted at specific individuals or organizations and can be used to launch more sophisticated attacks, such as ransomware attacks.

This bootcamp covers essential techniques such as reconnaissance, social engineering, email spoofing, website cloning, payload creation and defense evasion techniques.

Overview:

  • OSINT techniques to research targets and craft a targeted attack campaign
  • Deploying and configuring an attack infrastructure
  • Generating payloads and evading security protections
  • Advanced tactics and considerations to improve success probabilities
Intermediate Level MCSI Certification Beginner
ic-certificate Bootcamp
cpe-points 40
ic-money $450

Course Overview

Advanced persistent threats (APTs) use sophisticated phishing and spear-phishing techniques to gain access to an organization's network.

Phishing is a type of social engineering attack that uses email or other communication channels to trick users into clicking on a malicious link or opening a malicious attachment. Spear-phishing is a targeted form of phishing that is designed to trick a specific individual or group of individuals into taking action that will give the attacker access to their systems.

APTs use these techniques to gain initial access to an organization's network, and then they use a variety of tools and techniques to maintain their presence on the network and move laterally to other systems.

OSINT Research

OSINT (Open Source Intelligence) research is extremely important in spear-phishing and phishing campaigns. By definition, spear-phishing is a targeted email attack that seeks to gathering sensitive information from a specific individual or organization. In order to carry out a successful spear-phishing attack, the attacker must first research their target. This is where OSINT comes in.

OSINT is the process of collecting data from publicly available sources. This can include social media, websites, news articles, etc. By conducting thorough OSINT research, the attacker can learn everything they need to know about their target in order to create a believable and effective phishing email.

By completing this bootcamp, you will learn OSINT techniques to profile any organization or individual in order to create targeted phishing emails.

Resilient C2 Infrastructure

When conducting phishing and spear-phishing campaigns, it is important to use a resilient C2 infrastructure. This will ensure that your campaign can withstand any attempts to shut it down. By using a C2 infrastructure that is designed to be resilient, you can be sure that your campaign will be able to continue running and emails are not blocked by spam filters.

This bootcamp teaches you how to deploy and configure a resilient C2 infrastructure.

Attack Payloads

A spear-phishing payload is a malicious email that appears to come from a trusted source. The email contains a link or attachment that, when clicked, will install malware on the victim's computer. Spear-phishing payloads are important because they can be used to steal sensitive information or to gain access to sensitive systems.

Examples of payloads you will learn to use:

  • Legacy HTA files
  • Microsoft Office Macros
  • Shortcut files

Bypassing Security Protections

In this bootcamp, you will learn how to bypass spam filters and anti-virus software.

When delivering a spear-phishing campaign, it is important to bypass security protections in order to increase the chances of success. By bypassing security protections, attackers can more easily gain access to sensitive information and systems. Additionally, bypassing security protections can help attackers avoid detection and increase their chances of remaining undetected.

Training Modules

This course provides you with multiple training modules, each of which is designed to teach you practical skills that can help you solve important cyber problems. Each module offers exercises that will help you build your skills and capabilities.

  • PSP-01: Researching Your Target - 16 exercises
  • PSP-02: Setting up the infrastructure - 12 exercises
  • PSP-03: Payload Generation - 9 exercises
  • PSP-04: Payload Delivery - 6 exercises
  • PSP-05: Setting-Up the Campaign - 8 exercises

Certificate of Completion

You will receive a Certificate of Completion when you complete this course.

A Certificate of Completion can be very beneficial, especially when job hunting. It proves that you have completed a course and can be a great way to stand out among other candidates. Even if you do not have much experience, it shows that you are willing to learn and have the basic skills required for the job. In addition, some employers may require a Certificate of Completion for certain positions. Therefore, adding it to your portfolio is always an excellent choice.

Career Outcomes

Learn state-of-the-art phishing and spear-phishing techniques for penetration testing and Red Teaming. The bootcamp covers essential topics such as reconnaissance, social engineering, email spoofing, website cloning, payload creation and defense evasion techniques.

Certification Detail

MCSI Bootcamps are high-quality training exercises created by seasoned professionals to help beginners learn vital cyber security skills faster. Our bootcamps have an established track record of achievement, with a high-rate of graduation success.

If you are seeking practical cyber training that will accelerate your career, our bootcamps are the perfect solution.

Sample Exercises

Set Up GoPhish On A VPS

exercise

Write An HTA Payload To Execute A PowerShell Reverse Shell

exercise

Help and Support

Unmatched Mentorship: Accelerate Your Growth

At MCSI, mentorship is built to unlock your full potential. Receive personalized insights from multiple experts, tackle real-world challenges, and get the guidance you need to grow rapidly and excel in your cybersecurity career.

  • Personalized feedback with an average instructor response time of 1 business day
  • Direct access to instructors and peers via a 24/7 Discord server
  • Progress tracking and milestone assessments to keep you on course toward success
  • 95% of MCSI graduates land cybersecurity jobs with expert mentoring and feedback

24/7/365 Discord Community:

If you're looking for additional support during your studies, consider joining our Discord server. Our community of fellow students and instructors is always available to provide help and answer any questions you may have.

Personalized Support:

Your submissions will be reviewed by MCSI instructors, who will provide you with personalized feedback. This input is critical since it can assist you in identifying the areas where you need to enhance your skills. The instructor's feedback will also tell you how well you did an exercise and what you can do to improve your performance even further.

Click here to see an example of personalized feedback.

Our personalized support will take your skills to the next level. Read what a student says about it:

Quick Questions:

If you have any questions or need clarification on any of the exercises, MCSI offers a Quick Questions section on each exercise where you can ask for help. This is a great resource to use if you need assistance. This feature is only available for paid courses.

Prerequisites

Proficiency in the English language

You must have the ability to comfortably read and understand IT documentation written in English. Ideally, they have an IELTS score of 6.5 with no band less than 6 (or equivalent).

Note: You can register for this course without having undertaken an English test.

Training Laptop Requirement

This course can be completed on a standard training laptop. To ensure you have the necessary hardware to complete the course, your machine should meet the following specifications:

  • 64-bit Intel i5/i7 2.0+ GHz processor or equivalent
  • 8GB of RAM
  • Ability to run at least (1) virtual machine using Virtual Box, or an equivalent virtualization software
  • Windows 10 or later, macOS 10 or later, or Linux
  • Local administrator privileges
Do you support older operating systems?

Yes. Many of the exercises can be completed on older OS versions. A few of our students are successfully using older equipment to learn cyber security.

Knowledge Requirements

  • Knowledge of computer networking concepts and protocols, and network security methodologies
  • Knowledge of cyber threats and vulnerabilities
  • Knowledge of strategies and tools for target research

Technical Requirements

  • Ability to deploy and configure virtual machines in the cloud
  • Ability to install software utilities and use command line tools

Lab Environment

This course teaches you how to setup and configure your own cybersecurity lab.

  • Save thousands by avoiding the costs of pre-built labs
  • Customize your lab with the hardware and software you prefer
  • Gain practical skills in networking, system administration, and technical troubleshooting
  • Build confidence by practicing tasks you'll need to perform in real-world jobs
  • Manage and maintain your own tools—just as employers expect in the workplace

Why is the MCSI Method™ World Class?

why MCSI

Comprehensive, Effective, Exceeds Standards

MCSI offers training suitable for beginners and experts alike. We teach skills immediately applicable in the field. You will be confident in your ability to solve real-world problems. The MCSI platform will automatically create a portfolio to help you apply for jobs.

why MCSI

Exercises reviewed by experts

MCSI instructors are seasoned industry experts. We provide you with concise, relevant, and positive feedback for all your exercises, even if you don't succeed on the first try. Our feedback is specific to your work and only relevant to the exercise you submitted. You have the option to resubmit until you pass.

why MCSI

Supported by Cognitive Science

The MCSI Method is supported by cognitive science. We break down complex topics into small tasks related to the end goal. This prevents cognitive overload. Our essential tools are rubrics and feedback. Everything is practical. We simulate the ways of working professionals employ in the field.

Enrollment and Fees

MCSI Bootcamps

Unlock all the MCSI bootcamps with a single purchase:

Terms and Conditions

  • No discounts
  • No refunds
  • No transfers
  • No renewal fees
  • No hidden fees

How does MCSI Compare?

MCSI is 95% more cost-effective with 20x more practical training hours:

MCSI Bootcamps Traditional Vendors Conference Workshop University Bootcamps Cyber Ranges
Cost $450 $5,000+ $4,000+ $5,000+ $3,000+
Hours of training 300+ hours 40-48 16-40 40 40-100
Online Yes Some No No Yes
Practical 100% 50% 50% 50% 100%
Maintenance Level High Low Low Low Low
Free Trial Yes No No No No
Access to instructors Yes Some Yes Yes Some

Enroll now with lifetime access for $450

Bloom's Taxonomy

Employers seek problem-solvers who deliver real value. With MCSI, you'll develop practical, in-demand skills applicable across diverse cyber roles.

Information Security Professionals made a median salary of $103,590 in 2020. Cybersecurity roles are regularly ranked #1 jobs in the United States.

If you are looking to increase your earning potential, this course will put you on track for jobs that offer a salary of $75,000 to $150,000 per year. Why spend tens of thousands of dollars on degrees or theoretical certifications when you can develop in-demand practical skills in a shorter amount of time?

Enroll now with lifetime access for $450

Frequently Asked Questions

What is the MCSI Method™?

Common Questions

  • Will I receive a certificate?
    • Yes! You will receive a Certificate of Completion when you complete the bootcamp.
  • Are solutions included in the bootcamps?
    • Yes, for some exercises. Our method of teaching cyber security consists of challenging you with real-world problem statements that you're expected to research and solve by doing your own research. This is how you'll be expected to work in the field. When you fail an exercise, we provide you with constructive feedback to improve and try again.
  • Do the videos provides the answers to exercises?
    • For exercises listed in bootcamps, yes, the videos show the answers.
  • Do I need to purchase cybersecurity tools or subscriptions?
    • No. Only free or trial versions are used in our exercises. You do not require making any purchases.

DO YOU HAVE A QUESTION?

We'll respond within 24 hours

Visit our Frequently Asked Questions (FAQ) page for answers to the most common questions we receive.

Ready to learn hands-on cyber security skills online?

Try 100 hours for free