Course programme
Introduction
1 lecture 07:53
Introduction
A brief introduction to the course including prerequisites, learning objectives, and supplemental information.
Introduction
1 lecture 07:53
Introduction
A brief introduction to the course including prerequisites, learning objectives, and supplemental information.
Introduction
A brief introduction to the course including prerequisites, learning objectives, and supplemental information.
Introduction
A brief introduction to the course including prerequisites, learning objectives, and supplemental information.
Introduction
A brief introduction to the course including prerequisites, learning objectives, and supplemental information.
Introduction
A brief introduction to the course including prerequisites, learning objectives, and supplemental information.
A brief introduction to the course including prerequisites, learning objectives, and supplemental information.
A brief introduction to the course including prerequisites, learning objectives, and supplemental information.
Basics of USB Drop Attacks
4 lectures 12:27
What is a USB Drop Attack?
This section will define was USB drop attacks are and how they work.
What is a USB Drop Attack Summary
Why are these Attacks Effective?
This section explains why USB drop attacks can be effective against its targets.
Why are these Attacks Effective Summary
Basics of USB Drop Attacks
4 lectures 12:27
What is a USB Drop Attack?
This section will define was USB drop attacks are and how they work.
What is a USB Drop Attack Summary
Why are these Attacks Effective?
This section explains why USB drop attacks can be effective against its targets.
Why are these Attacks Effective Summary
What is a USB Drop Attack?
This section will define was USB drop attacks are and how they work.
What is a USB Drop Attack?
This section will define was USB drop attacks are and how they work.
What is a USB Drop Attack?
This section will define was USB drop attacks are and how they work.
What is a USB Drop Attack?
This section will define was USB drop attacks are and how they work.
This section will define was USB drop attacks are and how they work.
This section will define was USB drop attacks are and how they work.
What is a USB Drop Attack Summary
What is a USB Drop Attack Summary
What is a USB Drop Attack Summary
What is a USB Drop Attack Summary
Why are these Attacks Effective?
This section explains why USB drop attacks can be effective against its targets.
Why are these Attacks Effective?
This section explains why USB drop attacks can be effective against its targets.
Why are these Attacks Effective?
This section explains why USB drop attacks can be effective against its targets.
Why are these Attacks Effective?
This section explains why USB drop attacks can be effective against its targets.
This section explains why USB drop attacks can be effective against its targets.
This section explains why USB drop attacks can be effective against its targets.
Why are these Attacks Effective Summary
Why are these Attacks Effective Summary
Why are these Attacks Effective Summary
Why are these Attacks Effective Summary
Types of Attacks
7 lectures 19:05
Types of Attacks Introduction
This section will cover the types of USB drop attacks that exist and how each one works,
HID Spoofing
This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Malicious File/Code
This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Social Engineering Links
This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
USB Kill
This section will explain what USB kill devices are and how they are used.
Zero Day
This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack.
Types of Attacks Summary
Types of Attacks
7 lectures 19:05
Types of Attacks Introduction
This section will cover the types of USB drop attacks that exist and how each one works,
HID Spoofing
This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Malicious File/Code
This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Social Engineering Links
This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
USB Kill
This section will explain what USB kill devices are and how they are used.
Zero Day
This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack.
Types of Attacks Summary
Types of Attacks Introduction
This section will cover the types of USB drop attacks that exist and how each one works,
Types of Attacks Introduction
This section will cover the types of USB drop attacks that exist and how each one works,
Types of Attacks Introduction
This section will cover the types of USB drop attacks that exist and how each one works,
Types of Attacks Introduction
This section will cover the types of USB drop attacks that exist and how each one works,
This section will cover the types of USB drop attacks that exist and how each one works,
This section will cover the types of USB drop attacks that exist and how each one works,
HID Spoofing
This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
HID Spoofing
This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
HID Spoofing
This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
HID Spoofing
This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
This section will explain what HID spoofing attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Malicious File/Code
This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Malicious File/Code
This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Malicious File/Code
This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Malicious File/Code
This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
This section will explain what malicious file/code USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Social Engineering Links
This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Social Engineering Links
This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Social Engineering Links
This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
Social Engineering Links
This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
This section will explain what social engineering link USB drop attacks are, how attackers use them, and the advantages and disadvantages of this type of attack.
USB Kill
This section will explain what USB kill devices are and how they are used.
USB Kill
This section will explain what USB kill devices are and how they are used.
USB Kill
This section will explain what USB kill devices are and how they are used.
USB Kill
This section will explain what USB kill devices are and how they are used.
This section will explain what USB kill devices are and how they are used.
This section will explain what USB kill devices are and how they are used.
Zero Day
This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack.
Zero Day
This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack.
Zero Day
This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack.
Zero Day
This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack.
This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack.
This section will explain what zero day USB drop attacks are and how attackers may use this type of rare attack.
Types of Attacks Summary
Types of Attacks Summary
Types of Attacks Summary
Types of Attacks Summary
Disguising, Reconnaissance, and Deployment
5 lectures 19:41
Disguising Attacks Introduction
An introduction on disguising, reconnaissance, and deploying USB drop attacks.
Disgusing Attacks
This section will explain how attacks might disguise a USB drop attacks.
Reconnaissance
This section explains what reconnaissance is and how attacks may use it before an attack.
Deployment
This section explains what attackers may do when deploying their attacks.
Disguising, Reconnaissance, and Deployment Summary
This section summarizes disguising, recon, and deployment strategies attackers may use.
Disguising, Reconnaissance, and Deployment.
5 lectures 19:41
Disguising Attacks Introduction
An introduction on disguising, reconnaissance, and deploying USB drop attacks.
Disgusing Attacks
This section will explain how attacks might disguise a USB drop attacks - Hands on Example Part 1
...