Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Cyber Security Course! Volume 4: End Point Protection
Training Overview
Description of Training
Video Overview (3:04)
Section 1: Introduction
Welcome to Volume 4 (0:44)
Introduction to the Instructor! (2:06)
Security Quick Win! (11:23)
Target Audience (1:54)
Study Recommendations (4:19)
Course updates (0:40)
Section 2: Goals and Learning Objectives - Volume 4
What is End Point Protection? and why is it important? (4:38)
Goals and Learning Objectives - Volume 4 (3:26)
Section 3: File and Disk Encryption
Goals and Learning Objectives (0:44)
Disk Encryption – What is it good for? (7:48)
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation (5:29)
Disk Encryption Attacks - Physical (11:17)
Disk Encryption Attacks - Containers, Volumes and Partitions (2:21)
Windows - Disk Encryption - An Introduction (2:39)
Windows - Disk Encryption - Bitlocker (12:06)
Windows - Setting Up BitLocker (9:30)
Windows - Disk Encryption - VeraCrypt (11:28)
Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt (3:06)
Windows, Mac & Linux - Setting up VeraCrypt (11:42)
Mac - Filevault2 (5:39)
Mac - Setting up Filevault2 (7:35)
Linux Whole Disk Encryption - Dm-crypt and LUKS (5:54)
Linux - Setting up DMCrypt/LUKS (5:09)
Linux - Encrypting the Boot Partition with Grub2 (4:47)
Self Encrypting Drives (SEDs) (1:47)
Defense Against Disk Decryption Attacks (7:48)
File Encryption (4:13)
Mandatory Key Disclosure & Plausible Deniability (7:34)
Nesting Crypto Systems & Obfuscation (3:20)
Case Studies in Disk Decryption (2:45)
Section 4: Anti-Virus and End-Point-Protection
Goals and Learning Objectives (0:37)
Is Anti-Virus dead? - The Threat Landscape (3:55)
Is Anti-Virus dead? - Protection Methods (10:53)
Ransomware (4:17)
Anti-Virus and End-Point-Protection Testing (5:40)
The Problem With AV and EPP Testing (3:38)
The Best of Business End-Point-Protection (EPP) (4:04)
Windows - The Best of Anti-Virus and End-Point-Protection (4:05)
Business End Point Protection (EPP) (2:23)
Mac - XProtect (2:51)
Mac - The Best of Anti-Virus and End-Point-Protection (2:34)
Linux - The Best of Anti-Virus and End-Point-Protection (2:41)
Online and Second Opinion - Anti-Virus and End-Point-Protection (3:12)
Is Anti-Virus and End-Point-Protection Dangerous? (6:35)
Section 5: Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
Goals and Learning Objectives (0:34)
Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) (4:59)
End Point Detection and Response (EDR) (6:39)
End-Point-Protection: How It Works Together in Layers (6:57)
Section 6: End-Point-Protection Technology
Goals and Learning Objectives (0:40)
What Is Application and Execution Control? (9:49)
Windows - Application control - ACLs, Windows Permission Identifier & Accessenum (6:26)
Windows - Application control - User Account Control (UAC) (4:18)
Windows - Application control - Software Restriction Policies (4:34)
Windows - Application control - AppLocker (10:23)
Windows - Application Control - Parental controls (2:43)
Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks (6:35)
Windows - Exploitation Prevention - EMET (12:58)
Windows - Exploitation Prevention - Traps, MBEA and HMPA (4:49)
Windows 10 - Device Guard (11:32)
Windows - Defender Application Guard for Microsoft Edge (2:21)
Linux - Access Control Models (7:45)
Linux - Security frameworks - AppArmor (2:13)
Linux - Security frameworks - SElinux (3:19)
Linux - Security frameworks - Grsecurity (3:59)
Linux - Security frameworks - PaX and more (1:40)
Linux & Mac - File permissions, POSIX and ACLs (8:03)
Mac - Application control - Parental controls (3:03)
Mac - Application control - Gatekeeper (5:23)
Mac - Application control - System Integrity Protection (5:42)
Mac - Application control - Santa (3:47)
Mac - Application control - Xfence (Previously Little Flocker) (7:17)
Mac - Other Stuff! (1:19)
The New Normal For End-Point-Protection Technology (7:50)
Cylance (4:46)
Section 7: Threat Detection and Monitoring
Goals and Learning Objectives (0:48)
A Complete Failure to Detect Threats (5:20)
Rethinking Honeypots (4:37)
CanaryTokens (18:46)
OpenCanary (12:19)
Artillery - Binary Defense (3:32)
Honey Drive (1:13)
Intrusion Detection Systems (IDS) Part 1 - Methods (7:11)
Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n (4:55)
Host-Based Intrusion Detection - OSSEC (4:40)
Network Analysis - Sguil, Xplico & NetworkMiner (3:05)
File Integrity Monitoring (FIM) and Checking Part 1 (2:58)
File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe (2:31)
Network Security Toolkit (NST) (2:03)
Security Onion (1:17)
Security Information and Event Management Software (SIEM) (2:51)
Section 8: Malware and Hacker Hunting on the End-Point
Goals and Learning Objectives (0:48)
Introduction to Malware and Hacker Hunting (8:20)
Windows - Farbar Recovery Scanner (9:20)
Automated Malware Removal Tools (10:41)
Live Rescue Operating Systems, CDs, and USBs (6:42)
Windows - Malware Seek & Destroy (Process Explorer) Part 1 (11:33)
Windows - Malware Seek & Destroy - Process Explorer - Part 2 (10:04)
Windows - Malware Seek & Destroy - Process Tools (2:09)
Windows - Malware Seek & Destroy - Sigcheck (2:31)
Windows - Malware Seek & Destroy - Autoruns (10:09)
Windows - Malware Seek & Destroy - Process Monitor (10:47)
Windows - Malware Seek & Destroy - Network Connections (8:10)
Malware Seek & Destroy - Networkx (2:21)
Linux - Seek & Destroy Malware - Sysdig (10:27)
Linux - Seek & Destroy Malware and Hackers - Csysdig (11:13)
Linux - Seek & Destroy Malware and Hackers - debsums and unhide (1:53)
Linux & Mac OS X - Malware Seek & Destroy - netstat (7:13)
Linux & Mac OS X - Malware Seek & Destroy - lsof (8:15)
Linux - Malware Seek & Destroy - rkhunter (6:13)
Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD (2:00)
Linux - Malware Seek & Destroy - Linux - Persistence Part 1 (3:23)
Linux - Malware Seek & Destroy - Linux - Persistence Part 2 (10:18)
Linux - Malware Seek & Destroy - Linux - Persistence Part 3 (2:55)
Mac - Malware Seek & Destroy - Task Explorer (5:21)
Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer (7:26)
Mac, Linux & Windows - OSquery (14:47)
Firmware Rootkits – Seek and Destroy Part 1 (7:28)
Firmware Rootkits – Seek and Destroy Part 2 (4:05)
End-Point-Protection Recovery and Remediation Technology (3:17)
Encrypted Backup and Cloud Storage (6:03)
Section 9: Operating System and Application Hardening
Goals and Learning Objectives (0:47)
An Introduction to Hardening (5:28)
Hardening Standards (10:01)
OpenSCAP (12:46)
Baseline Auditing (3:31)
Windows – Hardening (1:54)
Windows - Security Compliance Manager (SCM) (11:01)
Mac – Hardening (1:35)
Linux – Hardening (3:31)
Security Focused Operating Systems (4:49)
Monitoring for Security Drift (1:16)
Section 10: Secure Deleting, Evidence Elimination and Anti-Forensics
Goals and Learning Objectives (0:43)
Secure File Deletion - Mechanical drives (8:10)
Secure File Deletion - Solid Sate Drive (6:37)
Evidence Elimination & Anti-Forensics - An Introduction (4:42)
Evidence Elimination - CCleaner and Bleachit (7:02)
Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer (5:49)
Disk Wiping - Mechanical Drives (5:46)
Disk Wiping - Solid State Drives (10:53)
Scrubbing EXIF & Metadata Part 1 - Introduction (6:56)
Scrubbing EXIF & Metadata Part 2 - Tools (5:14)
Scrubbing EXIF & Metadata Part 3 - Guidance (4:36)
Sensor Noise Camera Identification (4:06)
Section 11: Email Security, Privacy and Anonymity
Goals and Learning Objectives (1:05)
Clients, Protocols and Authentication (13:17)
Email Weaknesses (13:02)
PGP & GPG & Privacy (5:50)
PGP & GPG Clients (6:27)
Windows - PGP & GPG (19:52)
Tails - PGP & GPG (4:01)
PGP & GPG Weaknesses (6:15)
Improving OpenPGP Security - Best Practices - Part 1 (2:32)
Improving OpenPGP Security - Primary and Subkeys - Part 2 (12:20)
Improving OpenPGP Security - Smartcards/Yubikey - Part 3 (7:41)
Email Tracking & Exploits (10:33)
Email Anonymity & Pseudonymity (6:18)
TorBirdy (7:36)
Remailers (7:33)
Choosing an Email Provider (13:46)
Email Alternatives (3:17)
Section 12: Messengers - Security, Privacy and Anonymity
Goals and Learning Objectives (0:19)
An Introduction to Instant Messengers (3:08)
Instant Messengers - Signal (2:30)
Instant Messengers - Chatsecure (1:38)
Instant Messengers - Cryptocat (0:45)
Instant Messengers - Ricochet (0:46)
Instant Messengers - Other (0:38)
Video and Voice Messengers - Linphone (4:28)
Video and Voice Messengers - Jitsi (1:40)
Video and Voice Messengers - Other (0:57)
Section 13: BONUS SECTION
Congratulations!! (0:29)
BONUS - Important Information (0:46)
Certificate of Completion for CPEs (0:56)
BONUS Sample Lecture from Volume 1 - Qubes OS (19:07)
BONUS Sample Lecture from Volume 2 - Effective Network Isolation (12:27)
BONUS Sample Lecture from Volume 3 - Socks5 proxy tunneling (10:20)
Audio Version of Training
Audio Download
Course updates
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 30,000+ Top Cyber Security Courses And Labs.
UPGRADE NOW