The Complete Cyber Security Course : End Point Protection!
- Description
- Curriculum
- FAQ
- Reviews
Learn a
practical skill-set in securing laptops, desktops and mobile devices from all types
of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.
On this course we cover end-point-protection,
which is an extremely important and hot topic in cyber security right now!
Become a cyber security specialist – Go from a beginner to advanced in this easy to
follow expert course. Â
Covering all the major platforms Windows, MacOS, Linux, iOS and Android.
Master the selection and
implementation of solid disk encryption technology to protect devices from disk decryption attacks.
Understand the current
and next generation anti-virus solutions, how they work, how to select the best
products and how to implement them successfully.Â
Covering traditional end-point-protection technologies through
to next generation and future technology; application control, execution prevention, machine
learning and Artificial Intelligence.
Learn how we can detect and
monitor for threats such as malware and hackers through the use of security
through deception and detection technologies.
We have fun learning how to seek and
destroy system resident malware and hackers. Get up to speed on your hacker hunting!
Learn how to perform operating
system hardening to decrease the attacker surfaces of your devices to make them
safer.Â
Explore the best techniques in
anti-forensics to securely delete data and meta-data so that it is
unrecoverable by even computer forensics experts.
Plus there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.
This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity.Â
-
1Welcome to Volume 4Video lesson
-
2Introduction to the Instructor!Video lesson
-
3Security Quick Win!Video lesson
-
4Target AudienceVideo lesson
-
5Study RecommendationsVideo lesson
-
6Course updatesVideo lesson
-
7Cyber Security and Ethical Hacking CareersVideo lesson
How to start a career in cyber security and ethical hacking.
-
10Goals and Learning ObjectivesVideo lesson
-
11Disk Encryption – What is it good for?Video lesson
-
12Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & ImplementationVideo lesson
-
13Disk Encryption Attacks - PhysicalVideo lesson
-
14Disk Encryption Attacks - Containers, Volumes and PartitionsVideo lesson
-
15Windows - Disk Encryption - An IntroductionVideo lesson
-
16Windows - Disk Encryption - BitlockerVideo lesson
-
17Windows - Setting Up BitLockerVideo lesson
-
18Windows - Disk Encryption - VeraCryptVideo lesson
-
19Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and BestcryptVideo lesson
-
20Windows, Mac & Linux - Setting up VeraCryptVideo lesson
-
21Mac - Filevault2Video lesson
-
22Mac - Setting up Filevault2Video lesson
-
23Linux Whole Disk Encryption - Dm-crypt and LUKSVideo lesson
-
24Linux - Setting up DMCrypt/LUKSVideo lesson
-
25Linux - Encrypting the boot partition with Grub2Video lesson
-
26Self Encrypting Drives (SEDs)Video lesson
-
27Defense Against Disk Decryption AttacksVideo lesson
-
28File EncryptionVideo lesson
-
29Mandatory Key Disclosure & Plausible DeniabilityVideo lesson
-
30Nesting Crypto Systems & ObfuscationVideo lesson
-
31Case Studies in Disk DecryptionVideo lesson
-
32Goals and Learning ObjectivesVideo lesson
-
33Is Anti-Virus dead? - The Threat LandscapeVideo lesson
-
34Is Anti-Virus dead? - Protection MethodsVideo lesson
-
35RansomwareVideo lesson
-
36Anti-Virus and End-Point-Protection TestingVideo lesson
-
37The Problem With AV and EPP TestingVideo lesson
-
38The Best of Business End-Point-Protection (EPP)Video lesson
-
39Windows - The Best of Anti-Virus and End-Point-ProtectionVideo lesson
-
40Business End Point Protection (EPP)Video lesson
-
41Mac - XProtectVideo lesson
-
42Mac - The Best of Anti-Virus and End-Point-ProtectionVideo lesson
-
43Linux - The Best of Anti-Virus and End-Point-ProtectionVideo lesson
-
44Online and Second Opinion - Anti-Virus and End-Point-ProtectionVideo lesson
-
45Is Anti-Virus and End-Point-Protection Dangerous?Video lesson
-
50Goals and Learning ObjectivesVideo lesson
-
51What is application and execution control?Video lesson
-
52Windows - Application control - ACLs, Windows Permission Identifier & AccessenumVideo lesson
-
53Windows - Application control - User Account Control (UAC)Video lesson
-
54Windows - Application control - Software Restriction PoliciesVideo lesson
-
55Windows - Application control - AppLockerVideo lesson
-
56Windows - Application Control - Parental controlsVideo lesson
-
57Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanksVideo lesson
-
58Windows - Exploitation Prevention - EMETVideo lesson
-
59Windows - Exploitation Prevention - Traps, MBEA and HMPAVideo lesson
-
60Windows 10 - Device GuardVideo lesson
-
61Windows - Defender Application Guard for Microsoft EdgeVideo lesson
-
62Linux - Access Control ModelsVideo lesson
-
63Linux - Security frameworks - AppArmorVideo lesson
-
64Linux - Security frameworks - SElinuxVideo lesson
-
65Linux - Security frameworks - GrsecurityVideo lesson
-
66Linux - Security frameworks - PaX and moreVideo lesson
-
67Linux & Mac - File permissions, POSIX and ACLsVideo lesson
-
68Mac - Application control - Parental controlsVideo lesson
-
69Mac - Application control - GatekeeperVideo lesson
-
70Mac - Application control - System Integrity ProtectionVideo lesson
-
71Mac - Application control - SantaVideo lesson
-
72Mac - Application control - Xfence (Previously Little Flocker)Video lesson
-
73Mac - Other Stuff!Video lesson
-
74The New Normal For End-Point-Protection TechnologyVideo lesson
-
75CylanceVideo lesson
-
76Goals and Learning ObjectivesVideo lesson
-
77A Complete Failure to Detect ThreatsVideo lesson
-
78Rethinking HoneypotsVideo lesson
-
79CanaryTokensVideo lesson
-
80OpenCanaryVideo lesson
-
81Artillery - Binary DefenseVideo lesson
-
82Honey DriveVideo lesson
-
83Intrusion Detection Systems (IDS) Part 1 - MethodsVideo lesson
-
84Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-nVideo lesson
-
85Host-Based Intrusion Detection - OSSECVideo lesson
-
86Network Analysis - Sguil, Xplico & NetworkMinerVideo lesson
-
87File Integrity Monitoring (FIM) and Checking Part 1Video lesson
-
88File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El JefeVideo lesson
-
89Network Security Toolkit (NST)Video lesson
-
90Security OnionVideo lesson
-
91Security Information and Event Management Software (SIEM)Video lesson
