Automate your processes or perform a stealth pen-test assessment with this new kind of technical approach.
What Will I Learn?
- Write some snippets and understand how DigiSpark Arduino Works
- Students must be intermediate computer users
Everybody is talking about BadUSB attacks:
“If you put anything into your USB [slot], it extends a lot of trust,” Karsten Nohl, chief scientist at Security Research Labs in Berlin
“The BadUSB attack is quickly gaining global attention, and rightfully so.” Ken Jones, VP engineering and product management, IronKey Secure USB Devices
“Until strategies and plans to implement protection against firmware manipulation come into play, we can only urge you to be cautious.” Niall Mackey
And there are real and serious reasons:
There is no full proof protections to this new kind of attack.
You don’t need to be a scripting Guru in order to configure some scripts.
Anyone can get this device for as low as 1$ on eBay-
Want to know more ? Enrol today and find out a detailed explanation and exclusive scripts to perform your own assessments with this new kind of approach.
Who is the target audience?
- People focused in new IT security methodologies
Curriculum For This Course
Expand All 7 Lectures 43:06
+ Introduction and software 3 Lectures26:37
+ DigiSpark payloads 4 Lectures16:31
About the Instructor
Learn IT and go from 0 to 1
Courses range from WordPress, virtual reality, apps coding and other information technologies domains.
I have been teaching IT since 2007 and besides having a master degree in multimedia I like to share my knowledge and learn from my students to improve with each new course
Sharing my IT passion with you is the main goal, check out the positive feedbacks and I hope to have one from you in the future.