Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Complete Cyber Security Course! Volume 4 : End Point Protection
Section 1: Introduction
1. Welcome to Volume 4 (0:44)
2. Introduction to the Instructor! (2:06)
3. Security Quick Win! (11:24)
4. Target Audience (1:54)
5. Study Recommendations (4:34)
6. The Forum - For Questions, Answers and Other Resources (1:34)
7. Course updates (0:40)
Section 2: Goals and Learning Objectives - Volume 4
8. What is End Point Protection? and why is it important? (4:38)
9. Goals and Learning Objectives - Volume 4 (3:26)
Section 3: File and Disk Encryption
10. Goals and Learning Objectives (0:45)
11. Disk Encryption – What is it good for? (7:48)
12. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation (5:29)
13. Disk Encryption Attacks - Physical (11:17)
14 Disk Encryption Attacks - Containers, Volumes and Partitions (2:21)
15. Windows - Disk Encryption - An Introduction (2:40)
16. Windows - Disk Encryption - Bitlocker (12:07)
17. Windows - Setting Up BitLocker (9:30)
18. Windows - Disk Encryption - VeraCrypt (11:28)
19. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt (3:06)
20. Windows, Mac & Linux - Setting up VeraCrypt (11:42)
21. Mac - Filevault2 (5:39)
22. Mac - Setting up Filevault2 (7:35)
23. Linux Whole Disk Encryption - Dm-crypt and LUKS (5:54)
24. Linux - Setting up DMCrypt/LUKS (5:09)
25. Linux - Encrypting the boot partition with Grub2 (4:47)
26. Self Encrypting Drives (SEDs) (1:47)
27. Defense Against Disk Decryption Attacks (7:48)
28. File Encryption (4:13)
29. Mandatory Key Disclosure & Plausible Deniability (7:35)
30. Nesting Crypto Systems & Obfuscation (3:21)
31. Case Studies in Disk Decryption (2:46)
Section 4: Anti-Virus and End-Point-Protection
32. Goals and Learning Objectives (0:38)
33. Is Anti-Virus dead? - The Threat Landscape (3:55)
34. Is Anti-Virus dead? - Protection Methods (10:53)
35. Ransomware (4:17)
36. Anti-Virus and End-Point-Protection Testing (5:40)
37. The Problem With AV and EPP Testing (3:38)
38. The Best of Business End-Point-Protection (EPP) (4:04)
39. Windows - The Best of Anti-Virus and End-Point-Protection (4:05)
40. Business End Point Protection (EPP) (2:23)
41. Mac - XProtect (2:51)
42. Mac - The Best of Anti-Virus and End-Point-Protection (2:34)
43. Linux - The Best of Anti-Virus and End-Point-Protection (2:41)
44. Online and Second Opinion - Anti-Virus and End-Point-Protection (3:12)
45. Is Anti-Virus and End-Point-Protection Dangerous? (6:35)
Section 5: Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
46. Goals and Learning Objectives (0:34)
47. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) (4:59)
48. End Point Detection and Response (EDR) (6:39)
49. End-Point-Protection: How it works together in layers (6:57)
Section 6: End-Point-Protection Technology
50. Goals and Learning Objectives (0:40)
51. What is application and execution control? (9:49)
52. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum (6:27)
53. Windows - Application control - User Account Control (UAC) (4:18)
54. Windows - Application control - Software Restriction Policies (4:34)
55. Windows - Application control - AppLocker (10:23)
56. Windows - Application Control - Parental controls (2:43)
57. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks (6:35)
58. Windows - Exploitation Prevention - EMET (12:58)
59. Windows - Exploitation Prevention - Traps, MBEA and HMPA (4:49)
60. Windows 10 - Device Guard (11:32)
61. Windows - Defender Application Guard for Microsoft Edge (2:21)
62. Linux - Access Control Models (7:45)
63. Linux - Security frameworks - AppArmor (2:13)
64. Linux - Security frameworks - SElinux (3:19)
65. Linux - Security frameworks - Grsecurity (3:59)
66. Linux - Security frameworks - PaX and more (1:40)
67. Linux & Mac - File permissions, POSIX and ACLs (8:03)
68. Mac - Application control - Parental controls (3:04)
69. Mac - Application control - Gatekeeper (5:23)
70. Mac - Application control - System Integrity Protection (5:42)
71. Mac - Application control - Santa (3:48)
72. Mac - Application control - Little Flocker (6:59)
73. Mac - Other Stuff! (1:19)
74. The New Normal For End-Point-Protection Technology (7:50)
75. Cylance (4:46)
Section 7: Threat Detection and Monitoring
76. Goals and Learning Objectives (0:48)
77. A Complete Failure to Detect Threats (5:20)
78. Rethinking Honeypots (4:37)
79. CanaryTokens (18:46)
80. OpenCanary (12:19)
81. CanaryPi
82. Artillery - Binary Defense (3:32)
83. Honey Drive (1:13)
84. Intrusion Detection Systems (IDS) Part 1 - Methods (7:11)
85. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n (4:55)
86. Host-Based Intrusion Detection - OSSEC (4:40)
87. Network Analysis - Sguil, Xplico & NetworkMiner (3:05)
88. File Integrity Monitoring (FIM) and Checking Part 1 (2:58)
89. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe (2:31)
90. Network Security Toolkit (NST) (2:04)
91. Security Onion (1:17)
92. Security Information and Event Management Software (SIEM) (2:51)
Section 8: Malware and Hacker Hunting on the End-Point
93. Goals and Learning Objectives (0:49)
94. Introduction to Malware and Hacker Hunting (8:20)
95. Windows - Farbar Recovery Scanner (9:20)
96. Automated Malware Removal Tools (10:41)
97. Live Rescue Operating Systems, CDs, and USBs (6:42)
98. Windows - Malware Seek & Destroy (Process Explorer) Part 1 (11:33)
99. Windows - Malware Seek & Destroy - Process Explorer - Part 2 (10:04)
100. Windows - Malware Seek & Destroy - Process Tools (2:09)
101. Windows - Malware Seek & Destroy - Sigcheck (2:31)
102. Windows - Malware Seek & Destroy - Autoruns (10:09)
103. Windows - Malware Seek & Destroy - Process Monitor (10:47)
104. Windows - Malware Seek & Destroy - Network Connections (8:10)
105. Malware Seek & Destroy - Networkx (2:21)
106. Linux - Seek & Destroy Malware - Sysdig (10:27)
107. Linux - Seek & Destroy Malware and Hackers - Csysdig (11:13)
108. Linux - Seek & Destroy Malware and Hackers - debsums and unhide (1:53)
109. Linux & Mac OS X - Malware Seek & Destroy - netstat (7:13)
110. Linux & Mac OS X - Malware Seek & Destroy - lsof (8:15)
111. Linux - Malware Seek & Destroy - rkhunter (6:13)
112. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD (2:00)
113. Linux - Malware Seek & Destroy - Linux - Persistence Part 1 (3:23)
114. Linux - Malware Seek & Destroy - Linux - Persistence Part 2 (10:18)
115. Linux - Malware Seek & Destroy - Linux - Persistence Part 3 (2:56)
116. Mac - Malware Seek & Destroy - Task Explorer (5:22)
117. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer (7:26)
118. Mac, Linux & Windows - OSquery (14:47)
119. Firmware Rootkits – Seek and Destroy Part 1 (7:28)
120. Firmware Rootkits – Seek and Destroy Part 2 (4:05)
121. End-Point-Protection Recovery and Remediation Technology (3:17)
122. Encrypted Backup and Cloud Storage (6:03)
Section 9: Operating System and Application Hardening
123. Goals and Learning Objectives (0:47)
124. An Introduction to Hardening (5:28)
125. Hardening Standards (10:01)
126. OpenSCAP (12:46)
127. Baseline Auditing (3:31)
128. Windows – Hardening (1:54)
129. Windows - Security Compliance Manager (SCM) (11:01)
130. Mac – Hardening (1:35)
131. Linux – Hardening (3:31)
132. Security Focused Operating Systems (4:49)
133. Monitoring for Security Drift (1:16)
Section 10: Secure Deleting, Evidence Elimination and Anti-Forensics
134. Goals and Learning Objectives (0:43)
135 Secure File Deletion - Mechanical drives (8:10)
136. Secure File Deletion - Solid Sate Drive (6:37)
137. Evidence Elimination & Anti-Forensics - An Introduction (4:42)
138. Evidence Elimination - CCleaner and Bleachit (7:03)
139. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer (5:49)
140. Disk Wiping - Mechanical Drives (5:46)
141. Disk Wiping - Solid State Drives (10:53)
142. Scrubbing EXIF & Metadata Part 1 - Introduction (6:56)
143. Scrubbing EXIF & Metadata Part 2 - Tools (5:14)
144. Scrubbing EXIF & Metadata Part 3 - Guidance (4:36)
145. Sensor Noise Camera Identification (4:06)
Section 11: Email Security, Privacy and Anonymity
146. Goals and Learning Objectives (1:05)
147. Clients, Protocols and Authentication (13:17)
148. Email Weaknesses (13:02)
149. PGP & GPG & Privacy (5:50)
150. PGP & GPG Clients (6:28)
151. Windows - PGP & GPG (19:52)
152. Tail - PGP & GPG (4:01)
153. PGP & GPG Weaknesses (6:15)
154. Improving OpenPGP Security - Best Practices - Part 1 (2:32)
155. Improving OpenPGP Security - Primary and Subkeys - Part 2 (12:20)
156. Improving OpenPGP Security - Smartcards/Yubikey - Part 3 (7:42)
157. Email Tracking & Exploits (10:33)
158. Email Anonymity & Pseudonymity (6:18)
159. TorBirdy (7:36)
160. Remailers (7:34)
161. Choosing an Email Provider (13:46)
162. Email Alternatives (3:17)
Section 12: Messengers - Security, Privacy and Anonymity
163. Goals and Learning Objectives (0:19)
164. An Introduction to Instant Messengers (3:08)
165. Instant Messengers - Signal (2:30)
166. Instant Messengers - Chatsecure (1:39)
167. Instant Messengers - Cryptocat (0:45)
168. Instant Messengers - Ricochet (0:46)
169. Instant Messengers - Other (0:38)
170. Video and Voice Messengers - Linphone (4:29)
171. Video and Voice Messengers - Jitsi (1:40)
172. Video and Voice Messengers - Other (0:57)
Section 13: BONUS SECTION
173. Congratulations!! (0:29)
176. BONUS Sample Lecture from Volume 1 - Qubes OS (19:07)
177. BONUS Sample Lecture from Volume 2 - Effective Network Isolation (12:27)
178. BONUS Sample Lecture from Volume 3 - Socks5 proxy tunneling (10:20)
6. The Forum - For Questions, Answers and Other Resources
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock