The Hardware Pivot
Offered By: Kaspersky via YouTube
Course Description
Overview
Explore the dangers of hardware-based attacks in this 22-minute conference talk from Security Analyst Summit 2018. Delve into the growing risk of physical threats as businesses accumulate thousands of devices, increasing their vulnerability to modchips and counterfeit parts. Learn how these physical attacks can lead to the propagation of threats through internal networks. Discover the differences between hardware and software attacks, the role of social engineering, and the concept of pivot hardware. Gain insights into simple pen testing techniques and the potential impact of malicious hardware. Understand why physical access to devices is becoming a more significant concern for organizations with large device inventories.
Syllabus
Introduction
Disclaimers
Hardware vs Software
Social Engineering
Pivot Hardware
Simple Pen Test
Malicious Hardware
Taught by
Kaspersky
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube