The Complete Cyber Security Course : End Point Protection!

The Complete Cyber Security Course : End Point Protection!

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 16.5 Hours | 2.84 GB

Volume 4 :Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware

Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now!

Become a cyber security specialist – Go from a beginner to advanced in this easy to follow expert course.

Covering all the major platforms Windows, MacOS, Linux, iOS and Android.

Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks.

Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully.

Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.

Learn how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.

We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker hunting!

Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.

Explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.

Plus there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.

This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity.

What you’ll learn

  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • Start a career in cyber security. Become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
Table of Contents

Introduction
1 Welcome to Volume 4
2 Introduction to the Instructor
3 Security Quick Win
4 Target Audience
5 Study Recommendations
6 Course updates

Goals and Learning Objectives – Volume 4
8 What is End Point Protection and why is it important
9 Goals and Learning Objectives – Volume 4

File and Disk Encryption
10 Goals and Learning Objectives
11 Disk Encryption What is it good for
12 Disk Encryption Attacks – Cryptoalgorithms Brute Force Attacks Implementation
13 Disk Encryption Attacks – Physical
14 Disk Encryption Attacks – Containers Volumes and Partitions
15 Windows – Disk Encryption – An Introduction
16 Windows – Disk Encryption – Bitlocker
17 Windows – Setting Up BitLocker
18 Windows – Disk Encryption – VeraCrypt
19 Windows – Disk Encryption – CipherShed Diskcryptor Symantec and Bestcrypt
20 Windows Mac Linux – Setting up VeraCrypt
21 Mac – Filevault2
22 Mac – Setting up Filevault2
23 Linux Whole Disk Encryption – Dm-crypt and LUKS
24 Linux – Setting up DMCryptLUKS
25 Linux – Encrypting the boot partition with Grub2
26 Self Encrypting Drives (SEDs)
27 Defense Against Disk Decryption Attacks
28 File Encryption
29 Mandatory Key Disclosure Plausible Deniability
30 Nesting Crypto Systems Obfuscation
31 Case Studies in Disk Decryption

Anti-Virus and End-Point-Protection
32 Goals and Learning Objectives
33 Is Anti-Virus dead – The Threat Landscape
34 Is Anti-Virus dead – Protection Methods
35 Ransomware
36 Anti-Virus and End-Point-Protection Testing
37 The Problem With AV and EPP Testing
38 The Best of Business End-Point-Protection (EPP)
39 Windows – The Best of Anti-Virus and End-Point-Protection
40 Business End Point Protection (EPP)
41 Mac – XProtect
42 Mac – The Best of Anti-Virus and End-Point-Protection
43 Linux – The Best of Anti-Virus and End-Point-Protection
44 Online and Second Opinion – Anti-Virus and End-Point-Protection
45 Is Anti-Virus and End-Point-Protection Dangerous

Next Generation – Anti-Virus End-Point-Protection Detection Response (EDR)
46 Goals and Learning Objectives
47 Next Generation – Anti-Virus (NG-AV) End-Point-Protection (NG-EPP)
48 End Point Detection and Response (EDR)
49 End-Point-Protection How it works together in layers

End-Point-Protection Technology
50 Goals and Learning Objectives
51 What is application and execution control
52 Windows – Application control – ACLs Windows Permission Identifier Accessenum
53 Windows – Application control – User Account Control (UAC)
54 Windows – Application control – Software Restriction Policies
55 Windows – Application control – AppLocker
56 Windows – Application Control – Parental controls
57 Windows – Third Party App Control AV Appguard VoodooShield NoVirusThanks
58 Windows – Exploitation Prevention – EMET
59 Windows – Exploitation Prevention – Traps MBEA and HMPA
60 Windows 10 – Device Guard
61 Windows – Defender Application Guard for Microsoft Edge
62 Linux – Access Control Models
63 Linux – Security frameworks – AppArmor
64 Linux – Security frameworks – SElinux
65 Linux – Security frameworks – Grsecurity
66 Linux – Security frameworks – PaX and more
67 Linux Mac – File permissions POSIX and ACLs
68 Mac – Application control – Parental controls
69 Mac – Application control – Gatekeeper
70 Mac – Application control – System Integrity Protection
71 Mac – Application control – Santa
72 Mac – Application control – Xfence (Previously Little Flocker)
73 Mac – Other Stuff
74 The New Normal For End-Point-Protection Technology
75 Cylance

Threat Detection and Monitoring
76 Goals and Learning Objectives
77 A Complete Failure to Detect Threats
78 Rethinking Honeypots
79 CanaryTokens
80 OpenCanary
81 Artillery – Binary Defense
82 Honey Drive
83 Intrusion Detection Systems (IDS) Part 1 – Methods
84 Intrusion Detection Systems (IDS) Part 2 – Snort Suricata Bro IDS OpenWIPS-n
85 Host-Based Intrusion Detection – OSSEC
86 Network Analysis – Sguil Xplico NetworkMiner
87 File Integrity Monitoring (FIM) and Checking Part 1
88 File Integrity Monitoring (FIM) and Checking Part 2 – Tripwire and El Jefe
89 Network Security Toolkit (NST)
90 Security Onion
91 Security Information and Event Management Software (SIEM)

Malware and Hacker Hunting on the End-Point
92 Goals and Learning Objectives
93 Introduction to Malware and Hacker Hunting
94 Windows – Farbar Recovery Scanner
95 Automated Malware Removal Tools
96 Live Rescue Operating Systems CDs and USBs
97 Windows – Malware Seek Destroy – Process Explorer – Part 1
98 Windows – Malware Seek Destroy – Process Explorer – Part 2
99 Windows – Malware Seek Destroy – Process Tools
100 Windows – Malware Seek Destroy – Sigcheck
101 Windows – Malware Seek Destroy – Autoruns
102 Windows – Malware Seek Destroy – Process Monitor
103 Windows – Malware Seek Destroy – Network Connections
104 Malware Seek Destroy – Networkx
105 Linux – Malware Seek Destroy – Sysdig
106 Linux – Seek Destroy Malware and Hackers – Csysdig
107 Linux – Seek Destroy Malware and Hackers – debsums unhide
108 Linux Mac OS X – Malware Seek Destroy – netstat
109 Linux Mac OS X – Malware Seek Destroy – lsof
110 Linux – Malware Seek Destroy – rkhunter
111 Linux – Malware Seek Destroy – Linux – Chkrootkit Tiger Clamav LMD
112 Linux – Malware Seek Destroy – Linux – Persistence Part 1
113 Linux – Malware Seek Destroy – Linux – Persistence Part 2
114 Linux – Malware Seek Destroy – Linux – Persistence Part 3
115 Mac – Malware Seek Destroy – Task Explorer
116 Mac – Malware Seek Destroy KnockKnock BlockBlock KextViewer
117 Mac Linux Windows – OSquery
118 Firmware Rootkits Seek and Destroy Part 1
119 Firmware Rootkits Seek and Destroy Part 2
120 End-Point-Protection Recovery and Remediation Technology
121 Encrypted Backup and Cloud Storage

Operating System and Application Hardening
122 Goals and Learning Objectives
123 An Introduction to Hardening
124 Hardening Standards
125 OpenSCAP
126 Baseline Auditing
127 Windows – Hardening
128 Windows – Security Compliance Manager (SCM)
129 Mac Hardening
130 Linux Hardening
131 Security Focused Operating Systems
132 Monitoring for Security Drift

Secure Deleting Evidence Elimination and Anti-Forensics
133 Goals and Learning Objectives
134 Secure File Deletion – Mechanical drives
135 Secure File Deletion – Solid Sate Drives
136 Evidence Elimination Anti-Forensics – An Introduction
137 Evidence Elimination – CCleaner and Bleachit
138 Evidence Elimination – Virtual Memory Swap RAM Memory Cache and Buffer
139 Disk Wiping – Mechanical Drives
140 Disk Wiping – Solid State Drives (SSD)
141 Scrubbing EXIF Metadata Part 1 – Introduction
142 Scrubbing EXIF Metadata Part 2 – Tools
143 Scrubbing EXIF Metadata Part 3 – Guidance
144 Sensor Noise Camera Identification

Email Security Privacy and Anonymity
145 Goals and Learning Objectives
146 Clients Protocols and Authentication
147 Email Weaknesses
148 PGP GPG Privacy
149 PGP GPG Clients
150 Windows – PGP GPG
151 Tail – PGP GPG
152 PGP GPG Weaknesses
153 Improving OpenPGP Security – Best Practices – Part 1
154 Improving OpenPGP Security – Primary and Subkeys – Part 2
155 Improving OpenPGP Security – SmartcardsYubikey – Part 3
156 Email Tracking Exploits
157 Email Anonymity Pseudonymity
158 TorBirdy
159 Remailers
160 Choosing an Email Provider
161 Email Alternatives

Messengers – Security Privacy and Anonymity
162 Goals and Learning Objectives
163 An Introduction to Instant Messengers
164 Instant Messenger – Signal
165 Instant Messengers – Chatsecure
166 Instant Messengers – Cryptocat
167 Instant Messengers – Ricochet
168 Instant Messengers – Other
169 Video and Voice Messengers – Linphone
170 Video and Voice Messengers – Jitsi
171 Video and Voice Messengers – Other

Wrap Up
172 Congratulations
173 Certificate Of Completion for CPEs
174 Qubes OS
175 Effective Network Isolation
176 Socks5 proxy tunneling

BONUS Section
177 BONUS – How to Start a Career in Cyber Security