Hardware Attack Vectors
Offered By: nullcon via YouTube
Course Description
Overview
Explore hardware-based attack vectors in this 58-minute conference talk from nullcon Goa 2014. Delve into lesser-known aspects of computer security, focusing on hardware vulnerabilities when traditional methods prove impractical or impossible. Examine various attack techniques, including HID Vector, IR Vector, Radio, and Bus protocol attacks, with brief descriptions and demonstrations for each. Gain insights into situations where hardware-based approaches may succeed where other security measures fail. Learn about the challenges and potential of hardware security in the broader context of cybersecurity strategies.
Syllabus
nullcon Goa 2014: Hardware Attack Vectors by @YashinMehaboobe
Taught by
nullcon
Related Courses
Securing Digital DemocracyUniversity of Michigan via Coursera Computer Science 101
Stanford University via Coursera Introduction to Cybersecurity for Business
University of Colorado System via Coursera Proactive Computer Security
University of Colorado System via Coursera How Computers Work
University of London International Programmes via Coursera