The Complete Cyber Security End Point Protection

Volume 4 :Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware

Last updated 2022-01-10 | 4.7

- An advanced practical skill-set in securing laptops
- desktops and mobile devices.
- Start a career in cyber security. Become a cyber security specialist.
- The very latest up-to-date information and methods.

What you'll learn

An advanced practical skill-set in securing laptops
desktops and mobile devices.
Start a career in cyber security. Become a cyber security specialist.
The very latest up-to-date information and methods.
You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
We cover all the diverse technologies offered by end-point-protection software; from traditional approaches
through to next generation and future technology. Covering methods like application control
execution prevention
machine learning and AI.
How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
We end by looking the extremely important topic of email and messenger security.
A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.

* Requirements

* A basic understanding of using operating systems
* networks
* and the Internet. Be able to download and install software. A willingness to learn.
* I recommend you watch volumes 1
* 2 and 3 of this complete course before watching this volume 4 although it is not required.
* You can take this volume as a stand-alone course.
* Please note this is Volume 4 of 4 of the complete course. After the completion of all 4 volumes
* you will know more than 80% of security professionals
* government and law enforcement agents and even expert hackers about maintaining security
* privacy
* and anonymity.

Description

  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • Start a career in cyber security. Become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.

Course content

14 sections • 177 lectures

Welcome to Volume 4 Preview 00:44

Introduction to the Instructor! Preview 02:06

Security Quick Win! Preview 11:23

Target Audience Preview 01:54

Study Recommendations Preview 04:19

Course updates Preview 00:40

Cyber Security and Ethical Hacking Careers Preview 03:45

How to start a career in cyber security and ethical hacking.

What is End Point Protection? and why is it important? Preview 04:38

Goals and Learning Objectives - Volume 4 Preview 03:26

Goals and Learning Objectives Preview 00:44

Disk Encryption – What is it good for? Preview 07:48

Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation Preview 05:29

Disk Encryption Attacks - Physical Preview 11:17

Disk Encryption Attacks - Containers, Volumes and Partitions Preview 02:21

Windows - Disk Encryption - An Introduction Preview 02:39

Windows - Disk Encryption - Bitlocker Preview 12:06

Windows - Setting Up BitLocker Preview 09:30

Windows - Disk Encryption - VeraCrypt Preview 11:28

Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt Preview 03:06

Windows, Mac & Linux - Setting up VeraCrypt Preview 11:42

Mac - Filevault2 Preview 05:39

Mac - Setting up Filevault2 Preview 07:35

Linux Whole Disk Encryption - Dm-crypt and LUKS Preview 05:54

Linux - Setting up DMCrypt/LUKS Preview 05:09

Linux - Encrypting the boot partition with Grub2 Preview 04:47

Self Encrypting Drives (SEDs) Preview 01:47

Defense Against Disk Decryption Attacks Preview 07:48

File Encryption Preview 04:13

Mandatory Key Disclosure & Plausible Deniability Preview 07:34

Nesting Crypto Systems & Obfuscation Preview 03:20

Case Studies in Disk Decryption Preview 02:45

Goals and Learning Objectives Preview 00:37

Is Anti-Virus dead? - The Threat Landscape Preview 03:55

Is Anti-Virus dead? - Protection Methods Preview 10:53

Ransomware Preview 04:17

Anti-Virus and End-Point-Protection Testing Preview 05:40

The Problem With AV and EPP Testing Preview 03:38

The Best of Business End-Point-Protection (EPP) Preview 04:04

Windows - The Best of Anti-Virus and End-Point-Protection Preview 04:05

Business End Point Protection (EPP) Preview 02:23

Mac - XProtect Preview 02:51

Mac - The Best of Anti-Virus and End-Point-Protection Preview 02:34

Linux - The Best of Anti-Virus and End-Point-Protection Preview 02:41

Online and Second Opinion - Anti-Virus and End-Point-Protection Preview 03:12

Is Anti-Virus and End-Point-Protection Dangerous? Preview 06:35

Goals and Learning Objectives Preview 00:34

Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) Preview 04:59

End Point Detection and Response (EDR) Preview 06:39

End-Point-Protection: How it works together in layers Preview 06:57

Goals and Learning Objectives Preview 00:40

What is application and execution control? Preview 09:49

Windows - Application control - ACLs, Windows Permission Identifier & Accessenum Preview 06:26

Windows - Application control - User Account Control (UAC) Preview 04:18

Windows - Application control - Software Restriction Policies Preview 04:34

Windows - Application control - AppLocker Preview 10:23

Windows - Application Control - Parental controls Preview 02:43

Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks Preview 06:35

Windows - Exploitation Prevention - EMET Preview 12:58

Windows - Exploitation Prevention - Traps, MBEA and HMPA Preview 04:49

Windows 10 - Device Guard Preview 11:32

Windows - Defender Application Guard for Microsoft Edge Preview 02:21

Linux - Access Control Models Preview 07:45

Linux - Security frameworks - AppArmor Preview 02:13

Linux - Security frameworks - SElinux Preview 03:19

Linux - Security frameworks - Grsecurity Preview 03:59

Linux - Security frameworks - PaX and more Preview 01:40

Linux & Mac - File permissions, POSIX and ACLs Preview 08:03

Mac - Application control - Parental controls Preview 03:03

Mac - Application control - Gatekeeper Preview 05:23

Mac - Application control - System Integrity Protection Preview 05:42

Mac - Application control - Santa Preview 03:47

Mac - Application control - Xfence (Previously Little Flocker) Preview 07:17

Mac - Other Stuff! Preview 01:19

The New Normal For End-Point-Protection Technology Preview 07:50

Cylance Preview 04:46

Goals and Learning Objectives Preview 00:48

A Complete Failure to Detect Threats Preview 05:20

Rethinking Honeypots Preview 04:37

CanaryTokens Preview 18:46

OpenCanary Preview 12:19

Artillery - Binary Defense Preview 03:32

Honey Drive Preview 01:13

Intrusion Detection Systems (IDS) Part 1 - Methods Preview 07:11

Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n Preview 04:55

Host-Based Intrusion Detection - OSSEC Preview 04:40

Network Analysis - Sguil, Xplico & NetworkMiner Preview 03:05

File Integrity Monitoring (FIM) and Checking Part 1 Preview 02:58

File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe Preview 02:31

Network Security Toolkit (NST) Preview 02:03

Security Onion Preview 01:17

Security Information and Event Management Software (SIEM) Preview 02:51

Goals and Learning Objectives Preview 00:48

Introduction to Malware and Hacker Hunting Preview 08:20

Windows - Farbar Recovery Scanner Preview 09:20

Automated Malware Removal Tools Preview 10:41

Live Rescue Operating Systems, CDs, and USBs Preview 06:42

Windows - Malware Seek & Destroy - Process Explorer - Part 1 Preview 11:33

Windows - Malware Seek & Destroy - Process Explorer - Part 2 Preview 10:04

Windows - Malware Seek & Destroy - Process Tools Preview 02:09

Windows - Malware Seek & Destroy - Sigcheck Preview 02:31

Windows - Malware Seek & Destroy - Autoruns Preview 10:09

Windows - Malware Seek & Destroy - Process Monitor Preview 10:47

Windows - Malware Seek & Destroy - Network Connections Preview 08:10

Malware Seek & Destroy - Networkx Preview 02:21

Linux - Malware Seek & Destroy - Sysdig Preview 10:27

Linux - Seek & Destroy Malware and Hackers - Csysdig Preview 11:13

Linux - Seek & Destroy Malware and Hackers - debsums & unhide Preview 01:53

Linux & Mac OS X - Malware Seek & Destroy - netstat Preview 07:13

Linux & Mac OS X - Malware Seek & Destroy - lsof Preview 08:15

Linux - Malware Seek & Destroy - rkhunter Preview 06:13

Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD Preview 02:00

Linux - Malware Seek & Destroy - Linux - Persistence Part 1 Preview 03:23

Linux - Malware Seek & Destroy - Linux - Persistence Part 2 Preview 10:18

Linux - Malware Seek & Destroy - Linux - Persistence Part 3 Preview 02:55

Mac - Malware Seek & Destroy - Task Explorer Preview 05:21

Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer Preview 07:26

Mac, Linux & Windows - OSquery Preview 14:47

Firmware Rootkits – Seek and Destroy Part 1 Preview 07:28

Firmware Rootkits – Seek and Destroy Part 2 Preview 04:05

End-Point-Protection Recovery and Remediation Technology Preview 03:17

Encrypted Backup and Cloud Storage Preview 06:03

Goals and Learning Objectives Preview 00:47

An Introduction to Hardening Preview 05:28

Hardening Standards Preview 10:01

OpenSCAP Preview 12:46

Baseline Auditing Preview 03:31

Windows - Hardening Preview 01:54

Windows - Security Compliance Manager (SCM) Preview 11:01

Mac – Hardening Preview 01:35

Linux – Hardening Preview 03:31

Security Focused Operating Systems Preview 04:49

Monitoring for Security Drift Preview 01:16

Goals and Learning Objectives Preview 00:43

Secure File Deletion - Mechanical drives Preview 08:10

Secure File Deletion - Solid Sate Drives Preview 06:37

Evidence Elimination & Anti-Forensics - An Introduction Preview 04:42

Evidence Elimination - CCleaner and Bleachit Preview 07:02

Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer Preview 05:49

Disk Wiping - Mechanical Drives Preview 05:46

Disk Wiping - Solid State Drives (SSD) Preview 10:53

Scrubbing EXIF & Metadata Part 1 - Introduction Preview 06:56

Scrubbing EXIF & Metadata Part 2 - Tools Preview 05:14

Scrubbing EXIF & Metadata Part 3 - Guidance Preview 04:36

Sensor Noise Camera Identification Preview 04:06

Goals and Learning Objectives Preview 01:05

Clients, Protocols and Authentication Preview 13:17

Email Weaknesses Preview 13:02

PGP, GPG & Privacy Preview 05:50

PGP & GPG Clients Preview 06:27

Windows - PGP & GPG Preview 19:52

Tail - PGP & GPG Preview 04:01

PGP & GPG Weaknesses Preview 06:15

Improving OpenPGP Security - Best Practices - Part 1 Preview 02:32

Improving OpenPGP Security - Primary and Subkeys - Part 2 Preview 12:20

Improving OpenPGP Security - Smartcards/Yubikey - Part 3 Preview 07:41

Email Tracking & Exploits Preview 10:33

Email Anonymity & Pseudonymity Preview 06:18

TorBirdy Preview 07:36

Remailers Preview 07:33

Choosing an Email Provider Preview 13:46

Email Alternatives Preview 03:17

Goals and Learning Objectives Preview 00:19

An Introduction to Instant Messengers Preview 03:08

Instant Messenger - Signal Preview 02:30

Instant Messengers - Chatsecure Preview 01:38

Instant Messengers - Cryptocat Preview 00:45

Instant Messengers - Ricochet Preview 00:46

Instant Messengers - Other Preview 00:38

Video and Voice Messengers - Linphone Preview 04:28

Video and Voice Messengers - Jitsi Preview 01:40

Video and Voice Messengers - Other Preview 00:57

Congratulations!! Preview 00:29

Certificate Of Completion for CPEs Preview 00:56

Qubes OS Preview 19:07

Effective Network Isolation Preview 12:27

Socks5 proxy tunneling Preview 10:20

BONUS - How to Start a Career in Cyber Security Preview 00:45