Time
2 hours 14 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:00
Hi, everyone. Welcome back to the course. So in this video, we're gonna take a brief overview of the lab that you're going to be doing for this part of the course, So this lab is gonna be a fishing lab. So we're gonna be using an attack via phishing email. So basically, you're gonna be using a tool called the Social Engineering Toolkit or commonly called Set.
00:19
And with this tool, we're gonna create that phishing email. We're also going to use it to attach a malicious pdf file.
00:27
Then we're gonna go open that file and email,
00:30
and what that's going to do is show us that is gonna create a reverse shell,
00:35
then the next part of the lab that the last few steps there are going to be creating a security awareness email and then they're sending that out to the massive organizations. All this will be done inside of the cyber lab environment. One thing I do want to mention is
00:49
as these labs get updated, the cyber team periodically will review them and make sure that the commands in the syntax and everything are still correct for the lab. However, if you notice any issues. Please let our support team No one will be happy to take a look and make sure we refresh the labs a little more frequently
01:07
right in front of you on the screen. Here, you see a document. This is a step by step guide, so the lab does come with instructions inside of the browser. Here. We also create a secondary, step by step guide in case you like to download them and use those to walk through the lab. Some students prefer to download a document on news that as a reference
01:26
other students prefer, just use the instructions in the actual lab itself.
01:30
Another important thing to note in this lab is as you progress through it, you'll want to make sure to check these little boxes to the left of each step, and you notice when I do that,
01:41
it starts completing that progress bar for me. So you'll see here with just checking those forum about 15% complete.
01:47
Make sure you do that. You can get full credit for this particular lab.
01:51
So as always, if you have any questions at all or any issues with this particular lab, please feel free to reach out to the cyber team

Up Next

Social Engineering

In this social engineering course, students will learn the basic components of social engineering and how it is used.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor