Power BI Fundamentals - Create visualizations and dashboards from scratch
Get Coursera Plus for 40% off
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore hardware hacking techniques using the Metasploit Hardware Bridge in this conference talk from TROOPERS17. Learn how to leverage this powerful tool for IoT security testing and vulnerability assessment. Gain insights into the latest developments in hardware exploitation and discover practical applications for securing connected devices. Delve into the world of IoT security and enhance your skills in identifying and mitigating hardware-based vulnerabilities.
Syllabus
TR17 - Metasploit Hardware Bridge Hacking - Craig Smith
Taught by
WEareTROOPERS