We may earn an affiliate commission when you visit our partners.
Course image
Nathan House

Learn apractical skill-set in securing laptops, desktops and mobile devices from all typesof threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

Read more

Learn apractical skill-set in securing laptops, desktops and mobile devices from all typesof threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

On this course we cover end-point-protection,which is an extremely important and hot topic in cyber security right now.

Become a cyber security specialist - Go from a beginner to advanced in this easy tofollow expert course.

Covering all the major platforms Windows, MacOS, Linux, iOS and Android.

Master the selection andimplementation of solid disk encryption technology to protect devices from disk decryption attacks.

Understand the currentand next generation anti-virus solutions, how they work, how to select the bestproducts and how to implement them successfully.

Covering traditional end-point-protection technologies throughto next generation and future technology; application control, execution prevention, machinelearning and Artificial Intelligence.

Learn how we can detect andmonitor for threats such as malware and hackers through the use of securitythrough deception and detection technologies.

We have fun learning how to seek anddestroy system resident malware and hackers. Get up to speed on your hacker hunting.

Learn how to perform operatingsystem hardening to decrease the attacker surfaces of your devices to make themsafer.

Explore the best techniques inanti-forensics to securely delete data and meta-data so that it isunrecoverable by even computer forensics experts.

Plus there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.

This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity.

Enroll now

What's inside

Learning objectives

  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • Start a career in cyber security. become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. covering methods like application control, execution prevention, machine learning and ai.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor nathan house so cpe credits can be claimed. an off-site sign-up is required to provide your details for this optional certificate.
  • Show more
  • Show less

Syllabus

Introduction
Welcome to Volume 4
Introduction to the Instructor!
Security Quick Win!
Read more
Target Audience
Study Recommendations
Course updates

How to start a career in cyber security and ethical hacking.

You will learn the goals and learning objectives for Volume 4
What is End Point Protection? and why is it important?
Goals and Learning Objectives - Volume 4
File and Disk Encryption
Goals and Learning Objectives
Disk Encryption – What is it good for?
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
Disk Encryption Attacks - Physical
Disk Encryption Attacks - Containers, Volumes and Partitions
Windows - Disk Encryption - An Introduction
Windows - Disk Encryption - Bitlocker
Windows - Setting Up BitLocker
Windows - Disk Encryption - VeraCrypt
Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
Windows, Mac & Linux - Setting up VeraCrypt
Mac - Filevault2
Mac - Setting up Filevault2
Linux Whole Disk Encryption - Dm-crypt and LUKS
Linux - Setting up DMCrypt/LUKS
Linux - Encrypting the boot partition with Grub2
Self Encrypting Drives (SEDs)
Defense Against Disk Decryption Attacks
File Encryption
Mandatory Key Disclosure & Plausible Deniability
Nesting Crypto Systems & Obfuscation
Case Studies in Disk Decryption
Anti-Virus and End-Point-Protection
Is Anti-Virus dead? - The Threat Landscape
Is Anti-Virus dead? - Protection Methods
Ransomware
Anti-Virus and End-Point-Protection Testing
The Problem With AV and EPP Testing
The Best of Business End-Point-Protection (EPP)
Windows - The Best of Anti-Virus and End-Point-Protection
Business End Point Protection (EPP)
Mac - XProtect
Mac - The Best of Anti-Virus and End-Point-Protection
Linux - The Best of Anti-Virus and End-Point-Protection
Online and Second Opinion - Anti-Virus and End-Point-Protection
Is Anti-Virus and End-Point-Protection Dangerous?
Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
End Point Detection and Response (EDR)
End-Point-Protection: How it works together in layers
End-Point-Protection Technology
What is application and execution control?
Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
Windows - Application control - User Account Control (UAC)
Windows - Application control - Software Restriction Policies
Windows - Application control - AppLocker
Windows - Application Control - Parental controls
Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
Windows - Exploitation Prevention - EMET
Windows - Exploitation Prevention - Traps, MBEA and HMPA
Windows 10 - Device Guard
Windows - Defender Application Guard for Microsoft Edge
Linux - Access Control Models
Linux - Security frameworks - AppArmor
Linux - Security frameworks - SElinux
Linux - Security frameworks - Grsecurity
Linux - Security frameworks - PaX and more
Linux & Mac - File permissions, POSIX and ACLs
Mac - Application control - Parental controls
Mac - Application control - Gatekeeper
Mac - Application control - System Integrity Protection
Mac - Application control - Santa
Mac - Application control - Xfence (Previously Little Flocker)
Mac - Other Stuff!
The New Normal For End-Point-Protection Technology
Cylance
Threat Detection and Monitoring
A Complete Failure to Detect Threats
Rethinking Honeypots
CanaryTokens
OpenCanary
Artillery - Binary Defense
Honey Drive
Intrusion Detection Systems (IDS) Part 1 - Methods
Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
Host-Based Intrusion Detection - OSSEC
Network Analysis - Sguil, Xplico & NetworkMiner
File Integrity Monitoring (FIM) and Checking Part 1
File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
Network Security Toolkit (NST)
Security Onion
Security Information and Event Management Software (SIEM)
Malware and Hacker Hunting on the End-Point

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines how to avoid disk decryption attacks, making it useful for those concerned about data security
Teaches all major end-point-protection platforms, which is widely demanded by professionals
Develops skills in implementing robust disk encryption technology, which is crucial for protecting data
Covers a comprehensive range of end-point-protection technologies, from traditional to emerging
Provides hands-on experience in detecting and removing threats, which is essential for cybersecurity professionals
Requires learners to have some prior knowledge in cyber security

Save this course

Save The Complete Cyber Security Course : End Point Protection! to your list so you can find it easily later:
Save

Reviews summary

Cybersecurity endpoint course

According to students, this course is thorough, engaging, and practical. The class is well received, and it offers a deep dive into various cybersecurity topics. Students especially appreciate the use of hands-on activities and real-world examples.
The course covers Mac, Linux, and Windows platforms.
"The course is dense and in depth detailed across platform (Linux, MacOS and Windows)."
Cybersecurity canary tokens are a valuable tool.
"The Canary Token is definitely an interesting way to catch potential intrusion."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in The Complete Cyber Security Course : End Point Protection! with these activities:
Review basic computer security concepts
Refresh your knowledge of basic computer security concepts to ensure a solid foundation for the course.
Browse courses on Computer Security
Show steps
  • Review the CIA triad (confidentiality, integrity, availability)
  • Understand common types of security threats (e.g., malware, phishing, hacking)
  • Identify best practices for password management
Review endpoint encryption essentials
Reviewing key concepts and technologies related to endpoint encryption will strengthen your foundational knowledge and provide a stronger starting point for the course.
Show steps
  • Revisit the basics of encryption algorithms and key management.
  • Review different types of endpoint encryption solutions, such as full-disk encryption and file-level encryption.
  • Consider the pros and cons of different encryption methods and identify suitable use cases for each.
Review previous coursework or study materials on cybersecurity
Refreshing your memory of fundamental cybersecurity concepts will lay a solid foundation for the more advanced topics covered in the course.
Browse courses on Cybersecurity
Show steps
  • Gather your previous coursework or study materials related to cybersecurity.
  • Review the materials, focusing on key concepts and principles.
  • Make notes or create summaries to reinforce your understanding.
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
Review Fundamentals of Cyber Security
Sets a solid foundation for the different concepts, topics, and techniques covered in this course.
Show steps
  • Read the book's introduction and skim the table of contents
  • Focus your attention on the chapters most relevant to this course's materials
  • Take notes and/or highlight important concepts
Write a blog post or article on a cybersecurity topic
Writing a blog post or article will help you synthesize your understanding of cybersecurity concepts, improve your communication skills, and contribute to the broader cybersecurity community.
Browse courses on Cybersecurity
Show steps
  • Identify a specific cybersecurity topic that you are knowledgeable and passionate about.
  • Research the topic thoroughly to gather accurate and up-to-date information.
  • Organize your thoughts and develop an outline for your blog post or article.
  • Write a draft and carefully edit and proofread your work.
  • Publish your blog post or article on a reputable platform and share it with your network.
Strengthen disk encryption skills
Practice implementing disk encryption to enhance your understanding of file and disk encryption.
Show steps
  • Choose a suitable disk encryption tool.
  • Set up disk encryption on a test device.
  • Test the effectiveness of the encryption by attempting to decrypt the device without the encryption key.
  • Document the steps involved and any challenges encountered.
Attend a cybersecurity conference or workshop.
Attending a cybersecurity conference or workshop will expose you to cutting-edge research, industry best practices, and networking opportunities, broadening your knowledge and skills.
Show steps
  • Research and identify upcoming cybersecurity conferences or workshops relevant to your interests.
  • Register for the event and make travel arrangements if necessary.
  • Actively participate in the sessions, take notes, and engage with speakers and attendees.
  • Follow up with new connections made at the event and explore potential collaborations.
Test your understanding of anti-virus and end-point-protection
Engage in practical exercises to reinforce your knowledge of anti-virus and end-point-protection techniques.
Browse courses on Anti-Virus
Show steps
  • Set up a virtual environment with different anti-virus and end-point-protection software.
  • Run simulations of malware attacks and test the effectiveness of each software.
  • Document your observations and compare the performance of different software.
Contribute to an open-source security project
Contributing to an open-source security project will provide you with practical experience in cybersecurity and allow you to collaborate with others in the field.
Browse courses on Cybersecurity
Show steps
  • Identify open-source security projects that align with your interests and skills.
  • Review the project's documentation and contribution guidelines.
  • Start contributing to the project, whether through code contributions, bug reports, or documentation improvements.
  • Engage with the project community through forums or chat channels.
Develop a threat detection and monitoring system
Design and implement a system to monitor for and detect threats to your devices, enhancing your ability to protect against cyber attacks.
Browse courses on Threat Detection
Show steps
  • Research and select appropriate threat detection and monitoring tools.
  • Configure and deploy the system on your devices.
  • Establish a monitoring process to regularly review logs and identify potential threats.
  • Document the system and its implementation.
Explore anti-forensics techniques in practice
Engaging in hands-on tutorials will provide you with practical experience in implementing and evaluating anti-forensics techniques, enhancing your ability to protect data and maintain privacy.
Browse courses on Anti-Forensics
Show steps
  • Identify and research reputable sources providing anti-forensics tutorials.
  • Select a tutorial that aligns with your interests and skill level.
  • Follow the tutorial instructions carefully, implementing the techniques in a test environment.
  • Document your findings and observations, including any challenges or successes encountered.
Conduct penetration testing exercises
Performing penetration testing exercises will provide you with hands-on experience in identifying and exploiting security vulnerabilities, developing your skills in ethical hacking and security assessment.
Browse courses on Penetration Testing
Show steps
  • Set up a test environment with vulnerable systems and applications.
  • Use penetration testing tools and techniques to scan for vulnerabilities.
  • Exploit identified vulnerabilities to gain unauthorized access to the systems.
  • Document the findings and provide recommendations for remediation.
Develop a security plan for a specific device
Creating a comprehensive security plan will allow you to apply the concepts learned in the course to a practical scenario, enhancing your ability to protect devices effectively.
Browse courses on Security Planning
Show steps
  • Identify the specific device you want to focus on.
  • Conduct a risk assessment to identify potential threats and vulnerabilities.
  • Research and select appropriate security measures to mitigate the identified risks.
  • Develop a detailed implementation plan for the security measures.
  • Document the security plan, including the rationale behind each security measure.

Career center

Learners who complete The Complete Cyber Security Course : End Point Protection! will develop knowledge and skills that may be useful to these careers:
Cyber Security Analyst
A Cyber Security Analyst is a specialist in protecting computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course on End-Point Protection can help you build a foundation in securing laptops, desktops, and mobile devices from various threats, making you a more well-rounded candidate for this role.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains security measures to protect an organization's computer network and data. This course on End-Point Protection can help you build a foundation in securing the endpoints of a network, making you a more valuable candidate for this role.
Ethical Hacker
An Ethical Hacker is a security specialist who uses their knowledge of hacking techniques to identify and fix vulnerabilities in computer systems. This course on End-Point Protection can help you build a foundation in securing endpoints from hackers, making you a more effective Ethical Hacker.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to protect their computer networks and systems from security threats. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's information security program. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Cybersecurity Manager
A Cybersecurity Manager is responsible for overseeing an organization's cybersecurity program. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Security Architect
A Security Architect designs and implements security measures to protect an organization's computer network and data. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more valuable candidate for this role.
IT Security Specialist
An IT Security Specialist is responsible for implementing and maintaining security measures to protect an organization's computer network and data. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Malware Analyst
A Malware Analyst is a specialist in analyzing malware to identify its behavior and develop countermeasures. This course on End-Point Protection can help you build a foundation in protecting devices from malware, making you a more valuable candidate for this role.
Computer Forensics Analyst
A Computer Forensics Analyst investigates computer crimes and recovers evidence from computer systems. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Cloud Security Engineer
A Cloud Security Engineer designs and implements security measures to protect an organization's cloud computing environment. This course on End-Point Protection may be useful for building a foundation in securing endpoints in a cloud environment.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining computer systems. This course on End-Point Protection may be useful for building a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Network Administrator
A Network Administrator is responsible for managing and maintaining computer networks. This course on End-Point Protection may be useful for building a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Database Administrator
A Database Administrator is responsible for managing and maintaining databases. This course on End-Point Protection may be useful for building a foundation in securing endpoints that access databases, making you a more well-rounded candidate for this role.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. This course on End-Point Protection may be useful for building a foundation in securing endpoints that run software applications, making you a more well-rounded candidate for this role.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in The Complete Cyber Security Course : End Point Protection!.
A highly technical guide to malware analysis, providing detailed instructions and techniques for examining and understanding malicious software.
Covers Windows security best practices and provides step-by-step instructions for implementing security measures.
Provides a comprehensive overview of network security technologies and protocols, useful for those interested in a career in network security.
Provides a comprehensive overview of zero trust network concepts and architectures, useful for those interested in implementing zero trust in their organizations.
Provides a comprehensive overview of computer security concepts and best practices, suitable as a textbook for academic study or professional development.
An autobiography of one of the most famous and controversial hackers in history, providing a first-hand account of the motivations and techniques of a real-world hacker.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to The Complete Cyber Security Course : End Point Protection!.
The Complete Cyber Security Course : Hackers Exposed!
Most relevant
The Absolute Beginners Guide to Cyber Security 2024 -...
Most relevant
Digital Forensics and Cyber-Crime Investigation
Most relevant
Introduction to Cyber Security
Most relevant
Cyber Security Basics: A Hands-on Approach
Most relevant
The Complete Cyber Security Course : Network Security!
Most relevant
Wireshark Configuration for Cyber Security Analysis
Most relevant
Check Point Jump Start: Harmony Mobile
Most relevant
Check Point Jump Start: Harmony Mobile
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser