Library

Course: The Complete Cyber Security Course! Volume 4: End Point Protection!

The Complete Cyber Security Course! Volume 4: End Point Protection!

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now! 

Become a cyber security specialist - Go from a beginner to advanced in this easy to follow expert course. 

Covering all the major platforms Windows, MacOS, Linux, iOS and Android. 

Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks.

Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully. 

Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.

Learn how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.

We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker hunting!

Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer. 

Explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.

Plus there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication. 

This is volume 4 of 4 of your complete guide to cyber security, privacy, and anonymity.

Basic knowledge
  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn
  • I recommend you watch volumes 1, 2 and 3 of this complete course before watching this volume 4 although it is not required
  • You can take this volume as a stand-alone course
  • Please note this is Volume 4 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity
What you will learn
  • An advanced practical skill-set in securing laptops, desktops and mobile devices
  • Become a cyber security specialist
  • The very latest up-to-date information and methods
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts
  • We end by looking the extremely important topic of email and messenger security
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate
Curriculum
Number of Lecture: 175
Total Duration: 16:38:27
Introduction
  • Welcome to Volume 4  
  • Introduction to the Instructor!  
  • Security Quick Win!  
  • Target Audience  
  • Study Recommendations  
  • Course updates  
Goals and Learning Objectives - Volume 4
  • What is End Point Protection? and why is it important?  
  • Goals and Learning Objectives - Volume 4  
File and Disk Encryption
  • Goals and Learning Objectives - Session 3  
  • Disk Encryption – What is it good for?  
  • Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation  
  • Disk Encryption Attacks - Physical  
  • Disk Encryption Attacks - Containers, Volumes and Partitions  
  • Windows - Disk Encryption - An Introduction  
  • Windows - Disk Encryption - Bitlocker  
  • Windows - Setting Up BitLocker  
  • Windows - Disk Encryption - VeraCrypt  
  • Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt  
  • Windows, Mac & Linux - Setting up VeraCrypt  
  • Mac - Filevault2  
  • Mac - Setting up Filevault2  
  • Linux Whole Disk Encryption - Dm-crypt and LUKS  
  • Linux - Setting up DMCrypt/LUKS  
  • Linux - Encrypting the boot partition with Grub2  
  • Self Encrypting Drives (SEDs)  
  • Defense Against Disk Decryption Attacks  
  • File Encryption  
  • Mandatory Key Disclosure & Plausible Deniability  
  • Nesting Crypto Systems & Obfuscation  
  • Case Studies in Disk Decryption  
Anti-Virus and End-Point-Protection
  • Goals and Learning Objectives  
  • Is Anti-Virus dead? - The Threat Landscape  
  • Is Anti-Virus dead? - Protection Methods  
  • Ransomware  
  • Anti-Virus and End-Point-Protection Testing  
  • The Problem With AV and EPP Testing  
  • The Best of Business End-Point-Protection (EPP)  
  • Windows - The Best of Anti-Virus and End-Point-Protection  
  • Business End Point Protection (EPP)  
  • Mac - XProtect  
  • Mac - The Best of Anti-Virus and End-Point-Protection  
  • Linux - The Best of Anti-Virus and End-Point-Protection  
  • Online and Second Opinion - Anti-Virus and End-Point-Protection  
  • Is Anti-Virus and End-Point-Protection Dangerous?  
Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
  • Goals and Learning Objectives - Session 5  
  • Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)  
  • End Point Detection and Response (EDR)  
  • End-Point-Protection: How it works together in layers  
End-Point-Protection Technology
  • Goals and Learning Objectives - Session 6  
  • What is application and execution control?  
  • Windows - Application control - ACLs, Windows Permission Identifier & Accessenum  
  • Windows - Application control - User Account Control (UAC)  
  • Windows - Application control - Software Restriction Policies  
  • Windows - Application control - AppLocker  
  • Windows - Application Control - Parental controls  
  • Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks  
  • Windows - Exploitation Prevention - EMET  
  • Windows - Exploitation Prevention - Traps, MBEA and HMPA  
  • Windows 10 - Device Guard  
  • Windows - Defender Application Guard for Microsoft Edge  
  • Linux - Access Control Models  
  • Linux - Security frameworks - AppArmor  
  • Linux - Security frameworks - SElinux  
  • Linux - Security frameworks - Grsecurity  
  • Linux - Security frameworks - PaX and more  
  • Linux & Mac - File permissions, POSIX and ACLs  
  • Mac - Application control - Parental controls  
  • Mac - Application control - Gatekeeper  
  • Mac - Application control - System Integrity Protection  
  • Mac - Application control - Santa  
  • Mac - Application control - Xfence (Previously Little Flocker)  
  • Mac - Other Stuff!  
  • The New Normal For End-Point-Protection Technology  
  • Cylance  
Threat Detection and Monitoring
  • Goals and Learning Objectives - Session 7  
  • A Complete Failure to Detect Threats  
  • Rethinking Honeypots  
  • CanaryTokens  
  • OpenCanary  
  • Artillery - Binary Defense  
  • Honey Drive  
  • Intrusion Detection Systems (IDS) Part 1 - Methods  
  • Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n  
  • Host-Based Intrusion Detection - OSSEC  
  • Network Analysis - Sguil, Xplico & NetworkMiner  
  • File Integrity Monitoring (FIM) and Checking Part 1  
  • File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe  
  • Network Security Toolkit (NST)  
  • Security Onion  
  • Security Information and Event Management Software (SIEM)  
Malware and Hacker Hunting on the End-Point
  • Goals and Learning Objectives - Session 8  
  • Introduction to Malware and Hacker Hunting  
  • Windows - Farbar Recovery Scanner  
  • Automated Malware Removal Tools  
  • Live Rescue Operating Systems, CDs, and USBs  
  • Windows - Malware Seek & Destroy - Process Explorer - Part 1  
  • Windows - Malware Seek & Destroy - Process Explorer - Part 2  
  • Windows - Malware Seek & Destroy - Process Tools  
  • Windows - Malware Seek & Destroy - Sigcheck  
  • Windows - Malware Seek & Destroy - Autoruns  
  • Windows - Malware Seek & Destroy - Process Monitor  
  • Windows - Malware Seek & Destroy - Network Connections  
  • Malware Seek & Destroy - Networkx  
  • Linux - Malware Seek & Destroy - Sysdig  
  • Linux - Seek & Destroy Malware and Hackers - Csysdig  
  • Linux - Seek & Destroy Malware and Hackers - debsums & unhide  
  • Linux & Mac OS X - Malware Seek & Destroy - netstat  
  • Linux & Mac OS X - Malware Seek & Destroy - lsof  
  • Linux - Malware Seek & Destroy - rkhunter  
  • Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD  
  • Linux - Malware Seek & Destroy - Linux - Persistence Part 1  
  • Linux - Malware Seek & Destroy - Linux - Persistence Part 2  
  • Linux - Malware Seek & Destroy - Linux - Persistence Part 3  
  • Mac - Malware Seek & Destroy - Task Explorer  
  • Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer  
  • Mac, Linux & Windows - OSquery  
  • Firmware Rootkits – Seek and Destroy Part 1  
  • Firmware Rootkits – Seek and Destroy Part 2  
  • End-Point-Protection Recovery and Remediation Technology  
  • Encrypted Backup and Cloud Storage  
Operating System and Application Hardening
  • Goals and Learning Objectives - Session 9  
  • An Introduction to Hardening  
  • Hardening Standards  
  • OpenSCAP  
  • Baseline Auditing  
  • Windows - Hardening  
  • Windows - Security Compliance Manager (SCM)  
  • Mac – Hardening  
  • Linux – Hardening  
  • Security Focused Operating Systems  
  • Monitoring for Security Drift  
Secure Deleting, Evidence Elimination and Anti-Forensics
  • Goals and Learning Objectives - Session 10  
  • Secure File Deletion - Mechanical drives  
  • Secure File Deletion - Solid Sate Drives  
  • Evidence Elimination & Anti-Forensics - An Introduction  
  • Evidence Elimination - CCleaner and Bleachit  
  • Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer  
  • Disk Wiping - Mechanical Drives  
  • Disk Wiping - Solid State Drives (SSD)  
  • Scrubbing EXIF & Metadata Part 1 - Introduction  
  • Scrubbing EXIF & Metadata Part 2 - Tools  
  • Scrubbing EXIF & Metadata Part 3 - Guidance  
  • Sensor Noise Camera Identification  
Email Security, Privacy and Anonymity
  • Goals and Learning Objectives - Session 11  
  • Clients, Protocols and Authentication  
  • Email Weaknesses  
  • PGP, GPG & Privacy  
  • PGP & GPG Clients  
  • Windows - PGP & GPG  
  • Tail - PGP & GPG  
  • PGP & GPG Weaknesses  
  • Improving OpenPGP Security - Best Practices - Part 1  
  • Improving OpenPGP Security - Primary and Subkeys - Part 2  
  • Improving OpenPGP Security - Smartcards/Yubikey - Part 3  
  • Email Tracking & Exploits  
  • Email Anonymity & Pseudonymity  
  • TorBirdy  
  • Remailers  
  • Choosing an Email Provider  
  • Email Alternatives  
Messengers - Security, Privacy and Anonymity
  • Goals and Learning Objectives - Session 12  
  • An Introduction to Instant Messengers  
  • Instant Messenger - Signal  
  • Instant Messengers - Chatsecure  
  • Instant Messengers - Cryptocat  
  • Instant Messengers - Ricochet  
  • Instant Messengers - Other  
  • Video and Voice Messengers - Linphone  
  • Video and Voice Messengers - Jitsi  
  • Video and Voice Messengers - Other  
Wrap Up
  • Congratulations!!  
  • Certificate Of Completion for CPEs  
  • Qubes OS  
  • Effective Network Isolation  
  • Socks5 proxy tunneling  
Reviews (0)