The collective belief is that the "People" element is the weakest link in cyber defense. Leveraging this course can help you build your phishing program from scratch, implement it, select a suitable vendor, and optimize to the needs of your organization.
Can you quantify the cyber risk posed by your employees to your organization? An Enterprise-level Phishing Program can tell you exactly which employee, which branch, region, or country of your firm is posing the maximum cybersecurity risk. In this course, Building and Implementing an Enterprise-level Phishing Program, you will gain the ability to effectively run an enterprise-level phishing program. First, you will learn to decide the scope and audience. Next, you will discover the basics of running the campaigns including designing the campaign, prioritizing the audience, selecting a third-party vendor, and running the campaigns. Finally, you will explore what metrics to track and how to effectively link the phishing program to other Infosec activities in your organization. When you’re finished with this course, you will have the know-how to effectively complement your Infosec training and awareness program with a well defined Phishing Simulation.
Cyber Security professional with experience of working as consultant, Appsec, SecOps and Compliance Management. I have experience in Web and Mobile App Pentesting, Cryptography, ISO 27001, Network security and Security Engineering
Course Overview (Music) Hi, everyone. My name is Prashant Pandey, And welcome to my course, Building and Implementing an Enterprise-level Phishing Program. I am a security consultant and a penetration tester. I’ve had an amazing journey in improving security culture, awareness, and cyber resilience of organizations. I’m responsible for establishing phishing programs of numerous small, large, and medium organizations. Phishing programs are one of the best ways to quantify how well your training awareness programs are performing. At the course of it, running phishing campaigns is easy. The difficult aspect is to establish and implement a program around it. In this course, I’ll guide you through every aspect of building and implementing a phishing program. We will start by defining the scope and audience. We’ll then work on the necessary elements of a phishing program. We will look at an easy way of running a phishing program. We will also discuss how to select an appropriate window for the task. Lastly, we shall set up the performance evaluation KPIs of the phishing program. By the end of this course, you’ll be able to design and implement phishing programs for any large-to-small organization. I hope you’ll join me on this journey of Building and Implementing Enterprise-level Phishing Program course at Pluralsight.