• Online, Self-Paced
Course Description

Malicious devices are everywhere these days, whether you can see them or not.

Learning Objectives

By the end of this course, students should be able to:

  • Describe a USB Drop Attack
  • Explain why these Attacks are Effective
  • Describe types of USB Drop Attacks
  • Describe Disguising Attacks
  • Explain Reconnaissance
  • Explain Deployment of USB Drop Attacks
  • Understand Building USB Drop Attacks
  • Demonstrate How to Defend against USB Drop Attacks

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.