How important is email security?

Email is the most widely used attack vector!

  • "91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks" - Phishing Email – Most Favored Attack by TrendMicro.
  • "The Initial Compromise represents the methods intruders use to first penetrate a target organization’s network. As with most other APT groups, spear-phishing is APT1’s most commonly used technique. The spear-phishing emails contain either a malicious attachment or a hyperlink to a malicious file."  - APT1: Attack Lifecycle by Mandiant.
  • "95% of all state-affiliated espionage attacks relied on phishing in some way" - Data Breach Report by Verizon.
  • "Email is still the most commonly used attack vector for both opportunistic and targeted attacks." - Market Guide for Email Security by Gartner.
  • "Phishing is still the number one attack vector in use today" X-Force Threat Intelligence Index 2020 by IBM.


Muhammad Alharmeel

CyberSecurity Consultant

Muhammad is a cybersecurity consultant with 15+ years of experience. He helped multiple organizations improve their security posture and abilities to defend their networks. He has also performed numerous security assessments and responded to attacks for clients in government, financial, high technology, healthcare, and other industries.

He used to wear multiple hats/roles within IT security, flipping between defensive and offensive roles such as security operations, intrusion analysis, penetration testing, fuzzing, and exploitation. He holds multiple hands-on respected certifications within defensive and offensive domains such as the prestigious GIAC Security Expert -GSE, Offensive Security Certified Expert OSCE, and the Certified Information Security Manager - CISM designation.

Course curriculum

    1. Before we begin...

    2. A message from the instructor

    3. How critical is email security to organizations' security?

    1. Sender Spoofing

    2. Exercise 1 - Email Spoofing

    3. SPF - Sender Policy Framework

    4. Exercise 2 - SPF Record Creation & Validation

    5. DKIM - DomainKeys Identified Mail

    6. Exercise 3 - DKIM Record Creation & Validation

    7. DMARC - Domain-based Message Authentication, Reporting & Conformance

    8. Exercise 4 - DMARC Record Creation & Validation

    1. Threats

    2. Defensive Controls

    3. Exercise 5 - File Extension Regex Filter

    4. Exercise 6 - Cuckoo Sandbox Deployment

    1. Threats

    2. Defensive Controls

    3. Exercise – Detect Lookalike Domains

    1. User Awareness

    2. Phishing Simulators

    3. Exercise: GoPhish Deployment

    4. Honeypot Tokens

    5. Exercise: Canary Token Deployment

    6. Multi Factor Authentication - MFA

    7. Exercise: MFA Activation

    8. Conditional Access

    9. Exercise: Conditional Acces Whitelisted Countries

    10. Minimizing Exposure

    11. Exercise: Evaluate your organization's exposed internal mail headers.

    12. Server Hardening (CIS/DISA STIGS)

    13. Exercise: Email Server Security Assessment

    14. Business Buy-in

    1. Validate, Mitigate and Remediate

    2. Exercise: Incident Response Readiness

About this course

  • $247.00
  • 39 lessons
  • 0 hours of video content

Maximum result, minimum effort!

Did you know that SOC teams spend nearly a quarter of their day handling suspicious emails?

The State of Email Security Report shows that the biggest portion of security analysts' time is spent on investigating email threats while prevention received the least attention. Remember the old 80/20 rule, gaining 80% of the benefits for only 20% of the work? We can improve security by 80% only by implementing a specific 20% of controls. We should prioritize that 20%, get them done and we will get an excellent return on investment of time and energy.

SOC teams should avoid the fire fighting endless loop of responding to attacks without tackling the root cause behind the problem. Solving the root cause falls under the prevention part. Thus, It's a smart decision to allocate a good deal of resources towards enhancing prevention, particularly when building security programs from the ground up. A solid, defensible email system helps SOC analysts not only stop intruders from slipping through cracks. But also avoid alert fatigue and focus on things that matter most. 

A wise man once said, 

"An ounce of prevention is worth a pound of cure."

Course Objectives

  • Help SOC analysts understand email threat landscape.

  • Ability to assess enterprise email security posture.

  • Minimize attack surface and get a better return on investments.

  • Engineer a defensible email system.

Get certified and help your organization minimize its attack surface.

No stuffing! The course is very straightforward, focused, and to the point, ensuring that every explained topic can be practically applied in your work environment.


  • What types of questions are on the exam?

    The exam includes different types such as multiple choices, open, manually graded questions, and practical exercises.

  • What is the passing score?

    The passing score is 75%.

  • Do I need to study how to configure email security solutions?

    No, the exam does not include vendor solution-related questions. So, you do not need to study how to configure a secure email gateway.

  • When will my exam results be available?

    You will receive the exam results in an email within ten business days.

  • How long do I have access to the course material?

    You will have access for three months following your purchase date.

  • Will I receive a certificate after the course?

    Yes, but you have to pass the certification exam first.

  • How to schedule my exam?

    The certification exam will be released soon and cannot be scheduled at this time. We will send you an email to schedule your exam once released.

7 days 100% Money Back Guarantee

If you are not completely satisfied for ANY reason, simply request a refund, and we will return your money. No question asked!