Study Learn Grow
USB Drop Attacks

USB Drop Attacks


In this course, you will learn about one of the most commonly used attacks, the USB drop attack.

Overview

Description
Malicious devices are everywhere these days, whether you can see them or not. Some take the form of malicious wireless networks that steal information. Others are physically planted and can do practically anything a hacker desires. These devices are designed to destroy, steal, and infect all kinds of machines. Sometimes these devices can do their malicious tasks without a victim having any idea that they were attacked. In this course, you will learn about one of the most commonly used attacks, the USB drop attack.

Basic knowledge
No prior knowledge is required, however to fully participate in this course you will need the following:

A standard USB flash drive of any size
A USB device that functions as a Human Interface Device, preferably a USB Rubber Ducky
A computer with internet access
Text editing software, preferably Notepad++
A free Gmail account
A Windows 10 machine (labs will use attacks against Windows 10 OS)

Course Information

No prior knowledge is required, however to fully participate in this course you will need the following:

A standard USB flash drive of any size
A USB device that functions as a Human Interface Device, preferably a USB Rubber Ducky
A computer with internet access
Text editing software, preferably Notepad++
A free Gmail account
A Windows 10 machine (labs will use attacks against Windows 10 OS)

What will you learn
This course will teach you what USB drop attacks are and why they are so effective. You will see the different forms these attacks take, including spoofing keyboards, using malicious files/code, using social engineering links that trick victims in various ways, destruction of machines using electricity, and the use of previously unknown vulnerabilities against a target. You will discover how attackers disguise these attacks to make them successful. You get an understanding of the work attackers put into researching targets and deploying devices. Then you will be shown step by step how to conduct three different types of attacks. After learning everything about these attacks, you will learn how to defend against these attacks

IT Engineers
Network Administrators and Operators
Security policy makers
Ethical hackers
Pentesters

• Lifetime Access to Each Course
• Certificate on Completion of Course
• No Extra Charges Or Admin Fees
• Easy Access to Courses
• High Priority Support After Sales.
• Big Discounts on Individual Courses

Course Specifications

Numerous Cyber Security courses include ethical hacking, CompTIA and forensics. 

See All Courses

Adult education is the non-credential activity of gaining skills and improved education. 

See All Courses

Online education is electronically supported learning that relies on the Internet for teacher/student interaction. 

See All Courses

A short course is a learning programme that gives you combined content or specific skills training in a short period of time. Short courses often lean towards the more practical side of things and have less theory than a university course – this gives you a more hands-on experience within your field of interest.

See All Courses

Course duration is 24 hours.

See All Courses

Study Learn Grow

Related Jobs