We may earn an affiliate commission when you visit our partners.
Course image
Udemy logo

The Complete Cyber Security Course

End Point Protection!

Nathan House

Learn apractical skill-set in securing laptops, desktops and mobile devices from all typesof threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

Read more

Learn apractical skill-set in securing laptops, desktops and mobile devices from all typesof threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

On this course we cover end-point-protection,which is an extremely important and hot topic in cyber security right now.

Become a cyber security specialist - Go from a beginner to advanced in this easy tofollow expert course.

Covering all the major platforms Windows, MacOS, Linux, iOS and Android.

Master the selection andimplementation of solid disk encryption technology to protect devices from disk decryption attacks.

Understand the currentand next generation anti-virus solutions, how they work, how to select the bestproducts and how to implement them successfully.

Covering traditional end-point-protection technologies throughto next generation and future technology; application control, execution prevention, machinelearning and Artificial Intelligence.

Learn how we can detect andmonitor for threats such as malware and hackers through the use of securitythrough deception and detection technologies.

We have fun learning how to seek anddestroy system resident malware and hackers. Get up to speed on your hacker hunting.

Learn how to perform operatingsystem hardening to decrease the attacker surfaces of your devices to make themsafer.

Explore the best techniques inanti-forensics to securely delete data and meta-data so that it isunrecoverable by even computer forensics experts.

Plus there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.

This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity.

Enroll now

What's inside

Learning objectives

  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • Start a career in cyber security. become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. covering methods like application control, execution prevention, machine learning and ai.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor nathan house so cpe credits can be claimed. an off-site sign-up is required to provide your details for this optional certificate.
  • Show more
  • Show less

Syllabus

Introduction
Welcome to Volume 4
Introduction to the Instructor!
Security Quick Win!
Read more
Target Audience
Study Recommendations
Course updates

How to start a career in cyber security and ethical hacking.

You will learn the goals and learning objectives for Volume 4
What is End Point Protection? and why is it important?
Goals and Learning Objectives - Volume 4
File and Disk Encryption
Goals and Learning Objectives
Disk Encryption – What is it good for?
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
Disk Encryption Attacks - Physical
Disk Encryption Attacks - Containers, Volumes and Partitions
Windows - Disk Encryption - An Introduction
Windows - Disk Encryption - Bitlocker
Windows - Setting Up BitLocker
Windows - Disk Encryption - VeraCrypt
Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
Windows, Mac & Linux - Setting up VeraCrypt
Mac - Filevault2
Mac - Setting up Filevault2
Linux Whole Disk Encryption - Dm-crypt and LUKS
Linux - Setting up DMCrypt/LUKS
Linux - Encrypting the boot partition with Grub2
Self Encrypting Drives (SEDs)
Defense Against Disk Decryption Attacks
File Encryption
Mandatory Key Disclosure & Plausible Deniability
Nesting Crypto Systems & Obfuscation
Case Studies in Disk Decryption
Anti-Virus and End-Point-Protection
Is Anti-Virus dead? - The Threat Landscape
Is Anti-Virus dead? - Protection Methods
Ransomware
Anti-Virus and End-Point-Protection Testing
The Problem With AV and EPP Testing
The Best of Business End-Point-Protection (EPP)
Windows - The Best of Anti-Virus and End-Point-Protection
Business End Point Protection (EPP)
Mac - XProtect
Mac - The Best of Anti-Virus and End-Point-Protection
Linux - The Best of Anti-Virus and End-Point-Protection
Online and Second Opinion - Anti-Virus and End-Point-Protection
Is Anti-Virus and End-Point-Protection Dangerous?
Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
End Point Detection and Response (EDR)
End-Point-Protection: How it works together in layers
End-Point-Protection Technology
What is application and execution control?
Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
Windows - Application control - User Account Control (UAC)
Windows - Application control - Software Restriction Policies
Windows - Application control - AppLocker
Windows - Application Control - Parental controls
Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
Windows - Exploitation Prevention - EMET
Windows - Exploitation Prevention - Traps, MBEA and HMPA
Windows 10 - Device Guard
Windows - Defender Application Guard for Microsoft Edge
Linux - Access Control Models
Linux - Security frameworks - AppArmor
Linux - Security frameworks - SElinux
Linux - Security frameworks - Grsecurity
Linux - Security frameworks - PaX and more
Linux & Mac - File permissions, POSIX and ACLs
Mac - Application control - Parental controls
Mac - Application control - Gatekeeper
Mac - Application control - System Integrity Protection
Mac - Application control - Santa
Mac - Application control - Xfence (Previously Little Flocker)
Mac - Other Stuff!
The New Normal For End-Point-Protection Technology
Cylance
Threat Detection and Monitoring
A Complete Failure to Detect Threats
Rethinking Honeypots
CanaryTokens
OpenCanary
Artillery - Binary Defense
Honey Drive
Intrusion Detection Systems (IDS) Part 1 - Methods
Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
Host-Based Intrusion Detection - OSSEC
Network Analysis - Sguil, Xplico & NetworkMiner
File Integrity Monitoring (FIM) and Checking Part 1
File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
Network Security Toolkit (NST)
Security Onion
Security Information and Event Management Software (SIEM)
Malware and Hacker Hunting on the End-Point

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Examines how to avoid disk decryption attacks, making it useful for those concerned about data security
Teaches all major end-point-protection platforms, which is widely demanded by professionals
Develops skills in implementing robust disk encryption technology, which is crucial for protecting data
Covers a comprehensive range of end-point-protection technologies, from traditional to emerging
Provides hands-on experience in detecting and removing threats, which is essential for cybersecurity professionals
Requires learners to have some prior knowledge in cyber security

Save this course

Save The Complete Cyber Security Course : End Point Protection! to your list so you can find it easily later:
Save

Reviews summary

Cybersecurity endpoint course

According to students, this course is thorough, engaging, and practical. The class is well received, and it offers a deep dive into various cybersecurity topics. Students especially appreciate the use of hands-on activities and real-world examples.
The course covers Mac, Linux, and Windows platforms.
"The course is dense and in depth detailed across platform (Linux, MacOS and Windows)."
Cybersecurity canary tokens are a valuable tool.
"The Canary Token is definitely an interesting way to catch potential intrusion."

Career center

Learners who complete The Complete Cyber Security Course : End Point Protection! will develop knowledge and skills that may be useful to these careers:
Cyber Security Analyst
A Cyber Security Analyst is a specialist in protecting computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. This course on End-Point Protection can help you build a foundation in securing laptops, desktops, and mobile devices from various threats, making you a more well-rounded candidate for this role.
Network Security Engineer
A Network Security Engineer designs, implements, and maintains security measures to protect an organization's computer network and data. This course on End-Point Protection can help you build a foundation in securing the endpoints of a network, making you a more valuable candidate for this role.
Ethical Hacker
An Ethical Hacker is a security specialist who uses their knowledge of hacking techniques to identify and fix vulnerabilities in computer systems. This course on End-Point Protection can help you build a foundation in securing endpoints from hackers, making you a more effective Ethical Hacker.
Security Consultant
A Security Consultant provides advice and guidance to organizations on how to protect their computer networks and systems from security threats. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Information Security Manager
An Information Security Manager is responsible for developing and implementing an organization's information security program. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Cybersecurity Manager
A Cybersecurity Manager is responsible for overseeing an organization's cybersecurity program. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Security Architect
A Security Architect designs and implements security measures to protect an organization's computer network and data. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more valuable candidate for this role.
IT Security Specialist
An IT Security Specialist is responsible for implementing and maintaining security measures to protect an organization's computer network and data. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Malware Analyst
A Malware Analyst is a specialist in analyzing malware to identify its behavior and develop countermeasures. This course on End-Point Protection can help you build a foundation in protecting devices from malware, making you a more valuable candidate for this role.
Computer Forensics Analyst
A Computer Forensics Analyst investigates computer crimes and recovers evidence from computer systems. This course on End-Point Protection can help you build a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Cloud Security Engineer
A Cloud Security Engineer designs and implements security measures to protect an organization's cloud computing environment. This course on End-Point Protection may be useful for building a foundation in securing endpoints in a cloud environment.
Systems Administrator
A Systems Administrator is responsible for managing and maintaining computer systems. This course on End-Point Protection may be useful for building a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Network Administrator
A Network Administrator is responsible for managing and maintaining computer networks. This course on End-Point Protection may be useful for building a foundation in securing endpoints, making you a more well-rounded candidate for this role.
Database Administrator
A Database Administrator is responsible for managing and maintaining databases. This course on End-Point Protection may be useful for building a foundation in securing endpoints that access databases, making you a more well-rounded candidate for this role.
Software Engineer
A Software Engineer designs, develops, and maintains software applications. This course on End-Point Protection may be useful for building a foundation in securing endpoints that run software applications, making you a more well-rounded candidate for this role.

Reading list

We've selected nine books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in The Complete Cyber Security Course : End Point Protection!.
A highly technical guide to malware analysis, providing detailed instructions and techniques for examining and understanding malicious software.
Covers Windows security best practices and provides step-by-step instructions for implementing security measures.
Provides a comprehensive overview of network security technologies and protocols, useful for those interested in a career in network security.
Provides a comprehensive overview of zero trust network concepts and architectures, useful for those interested in implementing zero trust in their organizations.
Provides a comprehensive overview of computer security concepts and best practices, suitable as a textbook for academic study or professional development.
An autobiography of one of the most famous and controversial hackers in history, providing a first-hand account of the motivations and techniques of a real-world hacker.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to The Complete Cyber Security Course : End Point Protection!.
The Complete Cyber Security Course : Hackers Exposed!
Most relevant
The Absolute Beginners Guide to Cyber Security 2024 -...
Most relevant
Digital Forensics and Cyber-Crime Investigation
Most relevant
Introduction to Cyber Security
Most relevant
Cyber Security Basics: A Hands-on Approach
Most relevant
The Complete Cyber Security Course : Network Security!
Most relevant
Wireshark Configuration for Cyber Security Analysis
Most relevant
Check Point Jump Start: Harmony Mobile
Most relevant
Check Point Jump Start: Harmony Mobile
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser