Course Description
Malicious devices are everywhere these days, whether you can see them or not. Some take the form of malicious wireless networks that steal information. Others are physically planted and can do practically anything a hacker desires. These devices are designed to destroy, steal, and infect all kinds of machines. Sometimes these devices can do their malicious tasks without a victim having any idea that they were attacked. In this course, you will learn about one of the most commonly used attacks, the USB drop attack.
No prior knowledge is required, however to fully participate in this course you will need the following:
About the Provider
Course Provider Contact
Let Employers Find You
Upload/Update Your CVFeatured Courses