Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
In the last series of videos, we learned what types of us be dropped. Attacks there are out there in the next series of videos will be discussing how Attackers disguised their attacks, how Attackers do reconnaissance work before their attacks and how Attackers deploy their attacks.

Up Next

USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By

Instructor Profile Image
Shawn Briere
Information Security Analyst
Instructor