![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to educate participants on the vulnerabilities of Thunderbolt technology and the Thunderspy attacks that compromise its security. The course covers the DMA-enabled I/O of Thunderbolt devices and the potential risks posed by "evil maid" DMA attacks. Participants will learn about Intel's "Security Levels" architecture and cryptographic authentication methods to enhance device security. The teaching method involves presenting real-world attack scenarios and discussing strategies to mitigate security threats. This course is intended for cybersecurity professionals, system administrators, and individuals interested in understanding advanced hardware security concepts.
Syllabus
When Lightning Strikes Thrice: Breaking Thunderbolt 3 Security
Taught by
Black Hat