Course Overview

This specialized and comprehensive course is designed to provide an in-depth understanding of cybersecurity practices, with a focus on ethical hacking techniques to safeguard digital infrastructure. Through a series of detailed modules, participants will delve into modern security architectures, learn how to set up and manage phishing simulations using tools like GoPhish, bypass multi-factor authentication with Evilginx, and explore advanced phishing and vishing strategies. The curriculum also covers essential setup procedures for domain and email registration, configurations for AWS EC2 instances, and the use of SMS phishing (smishing) for security testing. Furthermore, the course emphasizes the importance of reporting, documentation, and ethical considerations in cybersecurity operations.


System Requirements

  • Access to a computer with internet connectivity capable of running virtual machines for tool setup and simulations.
  • Basic familiarity with command-line interfaces, networking concepts, and cybersecurity fundamentals is recommended for an optimal learning experience.

Practical Phishing Campaigns Course Objectives


Learning Objectives:

  • Gain a thorough understanding of modern cybersecurity and ethical hacking principles to protect against digital threats.
  • Learn the setup and configuration of phishing simulation tools, including GoPhish and Evilginx, for cybersecurity training and testing.
  • Master techniques for bypassing multi-factor authentication, implementing domain and email spoofing, and deploying SMS phishing campaigns.
  • Acquire skills in hardening cybersecurity measures, customizing phishing campaigns, and employing vishing strategies for comprehensive security assessments.
  • Understand the importance of clean-up practices, event logging, and detailed reporting for maintaining ethical standards and ensuring accountability in cybersecurity operations.
hacker stealing data via phishing

Who Should Take the Practical Phishing Campaigns Course?

  • Cybersecurity professionals seeking to enhance their skills in ethical hacking and digital defense strategies.
  • IT personnel tasked with safeguarding organizational digital assets and interested in practical, hands-on approaches to cybersecurity.
  • Individuals pursuing a career in cybersecurity, aiming to gain proficiency in contemporary ethical hacking tools and techniques.
  • Security consultants looking to expand their toolkit with advanced phishing and social engineering strategies.

Practical Phishing Campaigns Course Curriculum - 3 Hours

  The Perimeter - A Cat and Mouse Game
Available in days
days after you enroll
  Domain Registration
Available in days
days after you enroll
  Email Registration
Available in days
days after you enroll
  Gophish - Basic Phishing
Available in days
days after you enroll
  Gophish - Hardening and Advanced Techniques
Available in days
days after you enroll
  Evilginx - MFA Bypass
Available in days
days after you enroll
  Evilgophish - SMS Phishing
Available in days
days after you enroll
  Vishing Strategies
Available in days
days after you enroll
  Reporting, Documentation, and Cleaning Up
Available in days
days after you enroll
  Thank You!
Available in days
days after you enroll
Aaron Wilson

About the Instructor: Aaron Wilson

Aaron is a passionate security professional with experience in the Fortune 50. He is a Principal Penetration Tester at TCM Security, responsible for Mobile Application Penetration Testing of over 20 Mobile Apps. He is also an avid Capture the Flag Creator and has published multiple rooms on TryHackMe. Aaron is also CEO and Founder of the Wilson Security Group and publishes videos on YouTube on security topics and cybersecurity certification reviews.


Aaron holds certifications such as the eMAPT, CISSP, eCPPTv2, eWAPTv2, CEH, and eJPT certifications among others. He holds a bachelor's degree in Security and Risk Analysis from Penn State University as well as a Master's in Information Assurance and Cybersecurity from Western Governor's University (WGU).


Follow Aaron on Social Media:

LinkedIn - https://www.linkedin.com/in/wilson-security

YouTube - https://www.youtube.com/c/WilsonSecurityGroup

TryHackMe Hacker Methodology - https://tryhackme.com/room/hackermethodology


all-access membership wolf logo

This course is included in our
All-Access Membership
starting at $29.99/month

Get full access to the Practical Phishing Campaigns course and our full course catalog when you enroll in our All-Access Membership.

Frequently Asked Questions


Can I get a refund if I'm unhappy with my purchase?

Yes. All courses come with a 24-hour money-back guarantee.


Will I receive a certificate of completion when I finish a course?

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Pass?

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.


What if you already own courses on TCM Academy?

If you already own a course on our platform, you will continue to own that course forever. Previously owned courses will not be affected by this change.


I can see the course, but it won’t load or play. What should I do?

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at [email protected] and we will help you out.