1.0.1.2 Class Activity - Top Hacker Shows Us How It Is Done PDF
1.0.1.2 Class Activity - Top Hacker Shows Us How It Is Done PDF
1.0.1.2 Class Activity - Top Hacker Shows Us How It Is Done PDF
Objectives
Understand vulnerabilities of wireless and other common technologies
Background / Scenario
Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.
Required Resources
PC or mobile device with Internet access
Step 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at
TEDxMidwests”
a. Click on the link below and watch the Video.
Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests
In the video, Mr. Holman discusses various security vulnerabilities concerning systems that are typically
considered as secure, however, as he points out in his presentation, they are all vulnerable to attack.
b. Choose one of the hacks discussed by Mr. Holman in the video, and using your favorite search engine
conduct some additional research on the hack.
c. For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full
class discussion.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 1 www.netacad.com