Course Description
Malicious devices are everywhere these days, whether you can see them or not.
Learning Objectives
By the end of this course, students should be able to:
- Describe a USB Drop Attack
- Explain why these Attacks are Effective
- Describe types of USB Drop Attacks
- Describe Disguising Attacks
- Explain Reconnaissance
- Explain Deployment of USB Drop Attacks
- Understand Building USB Drop Attacks
- Demonstrate How to Defend against USB Drop Attacks