USB Drop Attack

Cybrary
Course

If you want to become a penetration tester, then you’ll need to learn about common malicious attacks on devices. This USB Drop Attack course will teach you about what makes these attacks so successful. Gain insights on how they’re formed by spoofing keyboards and using malicious code. Learn how to conduct and defend against these attacks.

Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3
4.1
Share
NEED TO TRAIN YOUR TEAM? LEARN MORE
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

This Course is part of a Career Path: Become a Penetration Tester

LEARN MORE. ACHIEVE MORE.

Follow A Path

Deciphering the essentials to enter a new career is hard, so we did it for you!

Focus on building your skills and take this course in a guided Career Path.

Course Description

If you want to become a penetration tester, then you’ll need to learn about common malicious attacks on devices. This USB Drop Attack course will teach you about what makes these attacks so successful. Gain insights on how they’re formed by spoofing keyboards and using malicious code. Learn how to conduct and defend against these attacks.

Instructed By
Shawn Briere
Shawn Briere
Information Security Analyst
Instructor
Provider
Cybrary
Certificate of Completion
Certificate Of Completion

Complete this entire course to earn a USB Drop Attack Certificate of Completion

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.