In this 1.75 hour Role Based Security training event Chris will explore: Programmable Human Interface Device (PHID)
- What is a PHID?
- History
- First Generation - Teensy a)Hardware b) Key Features c) Programming d) Frameworks
- Second Generation - USB Rubber Ducky a) Hardware b) Key Features c) Scripting Language d) Demonstration
- Third Generation - The Glitch a) Hardware b) Key Features c) Scripting Language d) Demonstration
- Counter-measures
- References - Shoutz
Learning Objectives
- Satisfy Annual Role Based Security Training Requirements
- Enhance awareness of IT and/or cyber security issues, threats and solutions.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Targets
- Threat Analysis
- Vulnerability Assessment and Management