Categories

There are currently no items in your shopping cart.

User Panel

Forgot your password?.

The Complete Cyber Security Course : End Point Protection!


Introduction :
Welcome to Volume 4
Introduction to the Instructor!
Security Quick Win!
Target Audience
Study Recommendations
Course updates

Goals and Learning Objectives - Volume 4 :
What is End Point Protection? and why is it important?
Goals and Learning Objectives - Volume 4

File and Disk Encryption :
Goals and Learning Objectives
Disk Encryption - What is it good for?
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
Disk Encryption Attacks - Physical
Disk Encryption Attacks - Containers, Volumes and Partitions
Windows - Disk Encryption - An Introduction
Windows - Disk Encryption - Bitlocker
Windows - Setting Up BitLocker
Windows - Disk Encryption - VeraCrypt
Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
Windows, Mac & Linux - Setting up VeraCrypt
Mac - Filevault2
Mac - Setting up Filevault2
Linux Whole Disk Encryption - Dm-crypt and LUKS
Linux - Setting up DMCrypt/LUKS
Linux - Encrypting the boot partition with Grub2
Self Encrypting Drives (SEDs)
Defense Against Disk Decryption Attacks
File Encryption
Mandatory Key Disclosure & Plausible Deniability
Nesting Crypto Systems & Obfuscation
Case Studies in Disk Decryption

Anti-Virus and End-Point-Protection :
Goals and Learning Objectives
Is Anti-Virus dead? - The Threat Landscape
Is Anti-Virus dead? - Protection Methods
Ransomware
Anti-Virus and End-Point-Protection Testing
The Problem With AV and EPP Testing
The Best of Business End-Point-Protection (EPP)
Windows - The Best of Anti-Virus and End-Point-Protection
Business End Point Protection (EPP)
Mac - XProtect
Mac - The Best of Anti-Virus and End-Point-Protection
Linux - The Best of Anti-Virus and End-Point-Protection
Online and Second Opinion - Anti-Virus and End-Point-Protection
Is Anti-Virus and End-Point-Protection Dangerous?

Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR) :
Goals and Learning Objectives
Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
End Point Detection and Response (EDR)
End-Point-Protection: How it works together in layers

End-Point-Protection Technology :
Goals and Learning Objectives
What is application and execution control?
Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
Windows - Application control - User Account Control (UAC)
Windows - Application control - Software Restriction Policies
Windows - Application control - AppLocker
Windows - Application Control - Parental controls
Windows - Third Party App Control - AV, Appguard, VoodooShield, NoVirusThanks
Windows - Exploitation Prevention - EMET
Windows - Exploitation Prevention - Traps, MBEA and HMPA
Windows 10 - Device Guard
Windows - Defender Application Guard for Microsoft Edge
Linux - Access Control Models
Linux - Security frameworks - AppArmor
Linux - Security frameworks - SElinux
Linux - Security frameworks - Grsecurity
Linux - Security frameworks - PaX and more
Linux & Mac - File permissions, POSIX and ACLs
Mac - Application control - Parental controls
Mac - Application control - Gatekeeper
Mac - Application control - System Integrity Protection
Mac - Application control - Santa
Mac - Application control - Xfence (Previously Little Flocker)
Mac - Other Stuff!
The New Normal For End-Point-Protection Technology
Cylance

Threat Detection and Monitoring :
Goals and Learning Objectives
A Complete Failure to Detect Threats
Rethinking Honeypots
CanaryTokens
OpenCanary
Artillery - Binary Defense
Honey Drive
Intrusion Detection Systems (IDS) Part 1 - Methods
Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
Host-Based Intrusion Detection - OSSEC
Network Analysis - Sguil, Xplico & NetworkMiner
File Integrity Monitoring (FIM) and Checking Part 1
File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
Network Security Toolkit (NST)
Security Onion
Security Information and Event Management Software (SIEM)

Malware and Hacker Hunting on the End-Point :
Goals and Learning Objectives
Introduction to Malware and Hacker Hunting
Windows - Farbar Recovery Scanner
Automated Malware Removal Tools
Live Rescue Operating Systems, CDs, and USBs
Windows - Malware Seek & Destroy - Process Explorer - Part 1
Windows - Malware Seek & Destroy - Process Explorer - Part 2
Windows - Malware Seek & Destroy - Process Tools
Windows - Malware Seek & Destroy - Sigcheck
Windows - Malware Seek & Destroy - Autoruns
Windows - Malware Seek & Destroy - Process Monitor
Windows - Malware Seek & Destroy - Network Connections
Malware Seek & Destroy - Networkx
Linux - Malware Seek & Destroy - Sysdig
Linux - Seek & Destroy Malware and Hackers - Csysdig
Linux - Seek & Destroy Malware and Hackers - debsums & unhide
Linux & Mac OS X - Malware Seek & Destroy - netstat
Linux & Mac OS X - Malware Seek & Destroy - lsof
Linux - Malware Seek & Destroy - rkhunter
Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
Linux - Malware Seek & Destroy - Linux - Persistence Part 1
Linux - Malware Seek & Destroy - Linux - Persistence Part 2
Linux - Malware Seek & Destroy - Linux - Persistence Part 3
Mac - Malware Seek & Destroy - Task Explorer
Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
Mac, Linux & Windows - OSquery
Firmware Rootkits - Seek and Destroy Part 1
Firmware Rootkits - Seek and Destroy Part 2
End-Point-Protection Recovery and Remediation Technology
Encrypted Backup and Cloud Storage

Operating System and Application Hardening :
Goals and Learning Objectives
An Introduction to Hardening
Hardening Standards
OpenSCAP
Baseline Auditing
Windows - Hardening
Windows - Security Compliance Manager (SCM)
Mac - Hardening
Linux - Hardening
Security Focused Operating Systems
Monitoring for Security Drift

Secure Deleting, Evidence Elimination and Anti-Forensics :
Goals and Learning Objectives
Secure File Deletion - Mechanical drives
Secure File Deletion - Solid Sate Drives
Evidence Elimination & Anti-Forensics - An Introduction
Evidence Elimination - CCleaner and Bleachit
Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
Disk Wiping - Mechanical Drives
Disk Wiping - Solid State Drives (SSD)
Scrubbing EXIF & Metadata Part 1 - Introduction
Scrubbing EXIF & Metadata Part 2 - Tools
Scrubbing EXIF & Metadata Part 3 - Guidance
Sensor Noise Camera Identification
Email Security, Privacy and Anonymity
17 lectures
Goals and Learning Objectives
Clients, Protocols and Authentication
Email Weaknesses
PGP, GPG & Privacy
PGP & GPG Clients
Windows - PGP & GPG
Tail - PGP & GPG
PGP & GPG Weaknesses
Improving OpenPGP Security - Best Practices - Part 1
Improving OpenPGP Security - Primary and Subkeys - Part 2
Improving OpenPGP Security - Smartcards/Yubikey - Part 3
Email Tracking & Exploits
Email Anonymity & Pseudonymity
TorBirdy
Remailers
Choosing an Email Provider
Email Alternatives
Messengers - Security, Privacy and Anonymity
10 lectures
Goals and Learning Objectives
An Introduction to Instant Messengers
Instant Messenger - Signal
Instant Messengers - Chatsecure
Instant Messengers - Cryptocat
Instant Messengers - Ricochet
Instant Messengers - Other
Video and Voice Messengers - Linphone
Video and Voice Messengers - Jitsi
Video and Voice Messengers - Other
Wrap Up
5 lectures
Congratulations!!
Certificate Of Completion for CPEs
Qubes OS
Effective Network Isolation
Socks5 proxy tunneling
BONUS Section
1 lecture
BONUS ** DISCOUNT COUPONS **