Udemy : The Complete Cyber Security Course | End Point Protection!

Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware, Application & Execution Control

3
The Complete Cyber Security Course End Point Protection!

What will you learn ?

  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • Instructor cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • Instructor explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • Instructor end by looking the extremely important topic of email and messenger security.

Hello niggas! This time we have come with the 4th volume of “The Complete Cyber Security Course“. This course is all about the End Point Protection. With this course you can learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more. In this course the instructor covered end-point-protection, which is an extremely important and hot topic in cyber security right now! Easy Beginner to advanced guide is presented for better understanding.

This is covering all the major platforms including Windows, MacOS, Linux, iOS and Android. You can also Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks. Better understandings of the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully.

Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer. This course is covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence. You will be learned that how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.

Requirements

  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
  • I recommend you watch volumes 1, 2 and 3 of this complete course before watching this volume 4 although it is not required.
  • You can take this volume as a stand-alone course.
  • Please note this is Volume 4 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

Curriculum For This Course

  1. Welcome to Volume 4 (00:44)
  2. Introduction to the Instructor! (02:06)
  3. Security Quick Win! (11:23)
  4. Target Audience (01:54)
  5. Study Recommendations (04:34)
  6. Course updates (00:40)
  1. What is End Point Protection? and why is it important? (04:38)
  2. Goals and Learning Objectives – Volume 4 (03:26)
  1. Goals and Learning Objectives (00:44)
  2. Disk Encryption – What is it good for? (07:48)
  3. Disk Encryption Attacks – Cryptoalgorithms, Brute Force Attacks & Implementation (05:29)
  4. Disk Encryption Attacks – Physical (11:17)
  5. Disk Encryption Attacks – Containers, Volumes and Partitions (02:21)
  6. Windows – Disk Encryption – An Introduction (02:39)
  7. Windows – Disk Encryption – Bitlocker (12:06)
  8. Windows – Setting Up BitLocker (09:30)
  9. Windows – Disk Encryption – VeraCrypt (11:28)
  10. Windows – Disk Encryption – CipherShed, Diskcryptor, Symantec and Bestcrypt (03:06)
  11. Windows, Mac & Linux – Setting up VeraCrypt (11:42)
  12. Mac – Filevault2 (05:39)
  13. Mac – Setting up Filevault2 (07:35)
  14. Linux Whole Disk Encryption – Dm-crypt and LUKS (05:54)
  15. Linux – Setting up DMCrypt/LUKS (05:09)
  16. Linux – Encrypting the boot partition with Grub2 (04:47)
  17. Self Encrypting Drives (SEDs) (01:47)
  18. Defense Against Disk Decryption Attacks (07:48)
  19. File Encryption (04:13)
  20. Mandatory Key Disclosure & Plausible Deniability (07:34)
  21. Nesting Crypto Systems & Obfuscation (03:20)
  22. Case Studies in Disk Decryption (02:45)
  1. Goals and Learning Objectives (00:37)
  2. Is Anti-Virus dead? – The Threat Landscape (03:55)
  3. Is Anti-Virus dead? – Protection Methods (10:53)
  4. Ransomware (04:17)
  5. Anti-Virus and End-Point-Protection Testing (05:40)
  6. The Problem With AV and EPP Testing (03:38)
  7. The Best of Business End-Point-Protection (EPP) (04:04)
  8. Windows – The Best of Anti-Virus and End-Point-Protection (04:05)
  9. Business End Point Protection (EPP) (02:23)
  10. Mac – XProtect (02:51)
  11. Mac – The Best of Anti-Virus and End-Point-Protection (02:34)
  12. Linux – The Best of Anti-Virus and End-Point-Protection (02:41)
  13. Online and Second Opinion – Anti-Virus and End-Point-Protection (03:12)
  14. Is Anti-Virus and End-Point-Protection Dangerous? (06:35)
  1. Goals and Learning Objectives (00:34)
  2. Next Generation – Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) (04:59)
  3. End Point Detection and Response (EDR) (06:39)
  4. End-Point-Protection: How it works together in layers (06:57)
  1. Goals and Learning Objectives (00:40)
  2. What is application and execution control? (09:49)
  3. Windows – Application control – ACLs, Windows Permission Identifier & Accessenum (06:26)
  4. Windows – Application control – User Account Control (UAC) (04:18)
  5. Windows – Application control – Software Restriction Policies (04:34)
  6. Windows – Application control – AppLocker (10:23)
  7. Windows – Application Control – Parental controls (02:43)
  8. Windows – Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks (06:35)
  9. Windows – Exploitation Prevention – EMET (12:58)
  10. Windows – Exploitation Prevention – Traps, MBEA and HMPA (04:49)
  11. Windows 10 – Device Guard (11:32)
  12. Windows – Defender Application Guard for Microsoft Edge (02:21)
  13. Linux – Access Control Models (07:45)
  14. Linux – Security frameworks – AppArmor (02:13)
  15. Linux – Security frameworks – SElinux (03:19)
  16. Linux – Security frameworks – Grsecurity (03:59)
  17. Linux – Security frameworks – PaX and more (01:40)
  18. Linux & Mac – File permissions, POSIX and ACLs (08:03)
  19. Mac – Application control – Parental controls (03:03)
  20. Mac – Application control – Gatekeeper (05:23)
  21. Mac – Application control – System Integrity Protection (05:42)
  22. Mac – Application control – Santa (03:47)
  23. Mac – Application control – Little Flocker (06:59)
  24. Mac – Other Stuff! (01:19)
  25. The New Normal For End-Point-Protection Technology (07:50)
  26. Cylance (04:46)
  1. Goals and Learning Objectives (00:48)
  2. A Complete Failure to Detect Threats (05:20)
  3. Rethinking Honeypots (04:37)
  4. CanaryTokens (18:46)
  5. OpenCanary (12:19)
  6. CanaryPi (00:05)
  7. Artillery – Binary Defense (03:32)
  8. Honey Drive (01:13)
  9. Intrusion Detection Systems (IDS) Part 1 – Methods (07:11)
  10. Intrusion Detection Systems (IDS) Part 2 – Snort, Suricata, Bro IDS & OpenWIPS-n (04:55)
  11. Host-Based Intrusion Detection – OSSEC (04:40)
  12. Network Analysis – Sguil, Xplico & NetworkMiner (03:05)
  13. File Integrity Monitoring (FIM) and Checking Part 1 (02:58)
  14. File Integrity Monitoring (FIM) and Checking Part 2 – Tripwire and El Jefe (02:31)
  15. Network Security Toolkit (NST) (02:03)
  16. Security Onion (01:17)
  17. Security Information and Event Management Software (SIEM) (02:51)
  1. Goals and Learning Objectives (00:48)
  2. Introduction to Malware and Hacker Hunting (08:20)
  3. Windows – Farbar Recovery Scanner (09:20)
  4. Automated Malware Removal Tools (10:41)
  5. Live Rescue Operating Systems, CDs, and USBs (06:42)
  6. Windows – Malware Seek & Destroy – Process Explorer – Part 1 (11:33)
  7. Windows – Malware Seek & Destroy – Process Explorer – Part 2 (10:04)
  8. Windows – Malware Seek & Destroy – Process Tools (02:09)
  9. Windows – Malware Seek & Destroy – Sigcheck (02:31)
  10. Windows – Malware Seek & Destroy – Autoruns (10:09)
  11. Windows – Malware Seek & Destroy – Process Monitor (10:47)
  12. Windows – Malware Seek & Destroy – Network Connections (08:10)
  13. Malware Seek & Destroy – Networkx (02:21)
  14. Linux – Malware Seek & Destroy – Sysdig (10:27)
  15. Linux – Seek & Destroy Malware and Hackers – Csysdig (11:13)
  16. Linux – Seek & Destroy Malware and Hackers – debsums & unhide (01:53)
  17. Linux & Mac OS X – Malware Seek & Destroy – netstat (07:13)
  18. Linux & Mac OS X – Malware Seek & Destroy – lsof (08:15)
  19. Linux – Malware Seek & Destroy – rkhunter (06:13)
  20. Linux – Malware Seek & Destroy – Linux – Chkrootkit, Tiger, Clamav & LMD (02:00)
  21. Linux – Malware Seek & Destroy – Linux – Persistence Part 1 (03:23)
  22. Linux – Malware Seek & Destroy – Linux – Persistence Part 2 (10:18)
  23. Linux – Malware Seek & Destroy – Linux – Persistence Part 3 (02:55)
  24. Mac – Malware Seek & Destroy – Task Explorer (05:21)
  25. Mac – Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer (07:26)
  26. Mac, Linux & Windows – OSquery (14:47)
  27. Firmware Rootkits – Seek and Destroy Part 1 (08:21)
  28. Firmware Rootkits – Seek and Destroy Part 2 (04:05)
  29. End-Point-Protection Recovery and Remediation Technology (03:17)
  30. Encrypted Backup and Cloud Storage (06:03)
  1. Goals and Learning Objectives (00:47)
  2. An Introduction to Hardening (05:28)
  3. Hardening Standards (10:01)
  4. OpenSCAP (12:46)
  5. Baseline Auditing (03:31)
  6. Windows – Hardening (01:54)
  7. Windows – Security Compliance Manager (SCM) (11:01)
  8. Mac – Hardening (01:35)
  9. Linux – Hardening (03:31)
  10. Security Focused Operating Systems (04:49)
  11. Monitoring for Security Drift (01:16)
  1. Goals and Learning Objectives (00:43)
  2. Secure File Deletion – Mechanical drives (08:10)
  3. Secure File Deletion – Solid Sate Drives (06:37)
  4. Evidence Elimination & Anti-Forensics – An Introduction (04:42)
  5. Evidence Elimination – CCleaner and Bleachit (07:02)
  6. Evidence Elimination – Virtual Memory, Swap, RAM Memory Cache and Buffer (05:49)
  7. Disk Wiping – Mechanical Drives (05:46)
  8. Disk Wiping – Solid State Drives (SSD) (10:53)
  9. Scrubbing EXIF & Metadata Part 1 – Introduction (06:56)
  10. Scrubbing EXIF & Metadata Part 2 – Tools (05:14)
  11. Scrubbing EXIF & Metadata Part 3 – Guidance (04:36)
  12. Sensor Noise Camera Identification (04:06)
  1. Goals and Learning Objectives (01:05)
  2. Clients, Protocols and Authentication (13:17)
  3. Email Weaknesses (13:02)
  4. PGP, GPG & Privacy (05:50)
  5. PGP & GPG Clients (06:27)
  6. Windows – PGP & GPG (19:52)
  7. Tail – PGP & GPG (04:01)
  8. PGP & GPG Weaknesses (06:15)
  9. Improving OpenPGP Security – Best Practices – Part 1 (02:32)
  10. Improving OpenPGP Security – Primary and Subkeys – Part 2 (12:20)
  11. Improving OpenPGP Security – Smartcards/Yubikey – Part 3 (07:41)
  12. Email Tracking & Exploits (10:33)
  13. Email Anonymity & Pseudonymity (06:18)
  14. TorBirdy (07:36)
  15. Remailers (07:33)
  1. Goals and Learning Objectives (00:19)
  2. An Introduction to Instant Messengers (03:08)
  3. Instant Messenger – Signal (02:30)
  4. Instant Messengers – Chatsecure (01:38)
  5. Instant Messengers – Cryptocat (00:45)
  6. Instant Messengers – Ricochet (00:46)
  7. Instant Messengers – Other (00:38)
  8. Video and Voice Messengers – Linphone (04:28)
  9. Video and Voice Messengers – Jitsi (01:40)
  10. Video and Voice Messengers – Other (00:57)
  1. Congratulations!! (00:29)
  2. BONUS – Important Information (00:46)
  3. Certificate Of Completion for CPEs (00:27)
  4. BONUS Sample Lecture from Volume 1 – Qubes OS (19:07)
  5. BONUS Sample Lecture from Volume 2 – Effective Network Isolation (12:27)
  6. BONUS Sample Lecture from Volume 3 – Socks5 proxy tunneling (10:20)
  7. BONUS ** DISCOUNT COUPONS ** (01:15)
Download in Single Zip File »

You’ll be redirected to download link after skipping 1 Ad.

Download Udemy Courses at even 95% OFF!

NOTE : The videos uploaded by us are the property of the Udemy. Our purpose here to share the knowledge among those who are unable to afford. The credit goes to main owner. Thanking you !
PLEASE COMMENT AND SUPPORT US..

freepremiumfooterwhite

3 COMMENTS

    • 1. Click to the “Green Button” here.
      2. Skip 1 Ad, Click “Continue” after waiting 5 secs.
      3. Now you’ll be redirected towards Uptobox Link.
      4. Wait there for about 30 secs and Click “Free Download”. A pop-up will open and click again, Now your download will start.