Requirements
-
Computer
-
If you want to copy what I demonstrate, you will need to purchase Hak5 devices
Description
Never, ever plug in some unknown USB thumb drive or cable into your computer!
Are you aware of what these kinds of malicious cables and usb devices can do?
In this course I’ll teach you how to use the Hak5 USB Rubber Ducky and O.MG cables to launch various attacks including reverse shell attacks using netcat.
This course teaches you Ethical hacking techniques and will hopefully help make you aware of why implementing good security practices at both home and the office are so important.
You can purchase these devices from the Hak5 website.
Who this course is for:
- Ethical hackers
- Security researchers
- Cybersecurity students
Related Courses:
Build Your Own Cyber Lab at Home
Linux for Cloud & DevOps Engineers
Practicalities involved in Exploratory Data Analysis (EDA)
Clojure's Core Syntax
Easy CLI Live server setup for node localhost
Arayavart Complete Tutorial of Shopify App Development
Education Tax Credits & Education Tax Benefits
Cybersecurity E-Degree | 74% OFF + 50% Cashback