The Complete Cyber Security Course: End Point Protection!
About Course
Get access to the **Complete Cyber Security Course: End Point Protection**, completely **free** on Theetay. This course, part of the Udemy catalog, teaches you practical skills to secure your laptops, desktops, and mobile devices against various threats, including hackers, trackers, exploit kits, and thieves.
This **cybersecurity course** covers **end-point protection**, a crucial topic in today’s digital landscape. You will learn about securing major platforms like **Windows, macOS, Linux, iOS, and Android**.
Master **disk encryption technology** to safeguard your devices from decryption attacks. Learn how to select and implement the best **anti-virus solutions**, understand their workings, and ensure successful deployment.
This comprehensive course delves into **traditional end-point protection technologies** and explores next-generation and future technologies like application control, execution prevention, machine learning, and Artificial Intelligence.
Discover how to **detect and monitor threats** like malware and hackers through security through deception and detection techniques.
Learn **hacker hunting techniques** to eliminate system-resident malware and hackers. Discover how to perform **operating system hardening** to minimize attack surfaces on your devices.
Explore the best **anti-forensics techniques** to securely delete data and metadata, making it unrecoverable, even for forensic experts.
This course also covers the critical topic of **email and messenger security**. Learn how to overcome email’s inherent security weaknesses and protect your communication.
This is volume 4 of 4 in your comprehensive guide to cybersecurity, privacy, and anonymity. Enroll now and start learning!
What Will You Learn?
- An advanced practical skill-set in securing laptops, desktops and mobile devices.
- Start a career in cyber security. Become a cyber security specialist.
- The very latest up-to-date information and methods.
- You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
- We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
- How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
- How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
- How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
- We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
- We end by looking the extremely important topic of email and messenger security.
- A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
Course Content
01. Introduction
-
A Message from the Professor
-
001. Welcome to Volume 4.mp4
00:00 -
002. Introduction to the Instructor!.mp4
00:00 -
003. Security Quick Win!.mp4
00:00 -
004. Target Audience.mp4
00:00 -
005. Study Recommendations.mp4
00:00 -
006. Course updates.mp4
00:00 -
007. Cyber Security and Ethical Hacking Careers.mp4
00:00 -
Section Quiz
02. Goals and Learning Objectives – Volume 4
-
001. What is End Point Protection and why is it important.mp4
00:00 -
002. Goals and Learning Objectives – Volume 4.mp4
00:00 -
Section Quiz
03. File and Disk Encryption
-
001. Goals and Learning Objectives.mp4
00:00 -
002. Disk Encryption – What is it good for.mp4
00:00 -
003. Disk Encryption Attacks – Cryptoalgorithms, Brute Force Attacks & Implementation.mp4
00:00 -
004. Disk Encryption Attacks – Physical.mp4
00:00 -
005. Disk Encryption Attacks – Containers, Volumes and Partitions.mp4
00:00 -
006. Windows – Disk Encryption – An Introduction.mp4
00:00 -
007. Windows – Disk Encryption – Bitlocker.mp4
00:00 -
008. Windows – Setting Up BitLocker.mp4
00:00 -
009. Windows – Disk Encryption – VeraCrypt.mp4
00:00 -
010. Windows – Disk Encryption – CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4
00:00 -
011. Windows, Mac & Linux – Setting up VeraCrypt.mp4
00:00 -
012. Mac – Filevault2.mp4
00:00 -
013. Mac – Setting up Filevault2.mp4
00:00 -
014. Linux Whole Disk Encryption – Dm-crypt and LUKS.mp4
00:00 -
015. Linux – Setting up DMCryptLUKS.mp4
00:00 -
016. Linux – Encrypting the boot partition with Grub2.mp4
00:00 -
017. Self Encrypting Drives (SEDs).mp4
00:00 -
018. Defense Against Disk Decryption Attacks.mp4
00:00 -
019. File Encryption.mp4
00:00 -
020. Mandatory Key Disclosure & Plausible Deniability.mp4
00:00 -
021. Nesting Crypto Systems & Obfuscation.mp4
00:00 -
022. Case Studies in Disk Decryption.mp4
00:00 -
Section Quiz
04. Anti-Virus and End-Point-Protection
-
001. Goals and Learning Objectives.mp4
00:00 -
002. Is Anti-Virus dead – The Threat Landscape.mp4
00:00 -
003. Is Anti-Virus dead – Protection Methods.mp4
00:00 -
004. Ransomware.mp4
00:00 -
005. Anti-Virus and End-Point-Protection Testing.mp4
00:00 -
006. The Problem With AV and EPP Testing.mp4
00:00 -
007. The Best of Business End-Point-Protection (EPP).mp4
00:00 -
008. Windows – The Best of Anti-Virus and End-Point-Protection.mp4
00:00 -
009. Business End Point Protection (EPP).mp4
00:00 -
010. Mac – XProtect.mp4
00:00 -
011. Mac – The Best of Anti-Virus and End-Point-Protection.mp4
00:00 -
012. Linux – The Best of Anti-Virus and End-Point-Protection.mp4
00:00 -
013. Online and Second Opinion – Anti-Virus and End-Point-Protection.mp4
00:00 -
014. Is Anti-Virus and End-Point-Protection Dangerous.mp4
00:00 -
Section Quiz
05. Next Generation – Anti-Virus, End-Point-Protection, Detection & Response (EDR)
-
001. Goals and Learning Objectives.mp4
00:00 -
002. Next Generation – Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).mp4
00:00 -
003. End Point Detection and Response (EDR).mp4
00:00 -
004. End-Point-Protection How it works together in layers.mp4
00:00 -
Section Quiz
06. End-Point-Protection Technology
-
001. Goals and Learning Objectives.mp4
00:00 -
002. What is application and execution control.mp4
00:00 -
003. Windows – Application control – ACLs, Windows Permission Identifier & Accessenum.mp4
00:00 -
004. Windows – Application control – User Account Control (UAC).mp4
00:00 -
005. Windows – Application control – Software Restriction Policies.mp4
00:00 -
006. Windows – Application control – AppLocker.mp4
00:00 -
007. Windows – Application Control – Parental controls.mp4
00:00 -
008. Windows – Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.mp4
00:00 -
009. Windows – Exploitation Prevention – EMET.mp4
00:00 -
010. Windows – Exploitation Prevention – Traps, MBEA and HMPA.mp4
00:00 -
011. Windows 10 – Device Guard.mp4
00:00 -
012. Windows – Defender Application Guard for Microsoft Edge.mp4
00:00 -
013. Linux – Access Control Models.mp4
00:00 -
014. Linux – Security frameworks – AppArmor.mp4
00:00 -
015. Linux – Security frameworks – SElinux.mp4
00:00 -
016. Linux – Security frameworks – Grsecurity.mp4
00:00 -
017. Linux – Security frameworks – PaX and more.mp4
00:00 -
018. Linux & Mac – File permissions, POSIX and ACLs.mp4
00:00 -
019. Mac – Application control – Parental controls.mp4
00:00 -
020. Mac – Application control – Gatekeeper.mp4
00:00 -
021. Mac – Application control – System Integrity Protection.mp4
00:00 -
022. Mac – Application control – Santa.mp4
00:00 -
023. Mac – Application control – Xfence (Previously Little Flocker).mp4
00:00 -
024. Mac – Other Stuff!.mp4
00:00 -
025. The New Normal For End-Point-Protection Technology.mp4
00:00 -
026. Cylance.mp4
00:00
07. Threat Detection and Monitoring
-
001. Goals and Learning Objectives.mp4
00:00 -
002. A Complete Failure to Detect Threats.mp4
00:00 -
003. Rethinking Honeypots.mp4
00:00 -
004. CanaryTokens.mp4
00:00 -
005. OpenCanary.mp4
00:00 -
006. Artillery – Binary Defense.mp4
00:00 -
007. Honey Drive.mp4
00:00 -
008. Intrusion Detection Systems (IDS) Part 1 – Methods.mp4
00:00 -
009. Intrusion Detection Systems (IDS) Part 2 – Snort, Suricata, Bro IDS & OpenWIPS-n.mp4
00:00 -
010. Host-Based Intrusion Detection – OSSEC.mp4
00:00 -
011. Network Analysis – Sguil, Xplico & NetworkMiner.mp4
00:00 -
012. File Integrity Monitoring (FIM) and Checking Part 1.mp4
00:00 -
013. File Integrity Monitoring (FIM) and Checking Part 2 – Tripwire and El Jefe.mp4
00:00 -
014. Network Security Toolkit (NST).mp4
00:00 -
015. Security Onion.mp4
00:00 -
016. Security Information and Event Management Software (SIEM).mp4
00:00 -
Section Quiz
08. Malware and Hacker Hunting on the End-Point
-
001. Goals and Learning Objectives.mp4
00:00 -
002. Introduction to Malware and Hacker Hunting.mp4
00:00 -
003. Windows – Farbar Recovery Scanner.mp4
00:00 -
004. Automated Malware Removal Tools.mp4
00:00 -
005. Live Rescue Operating Systems, CDs, and USBs.mp4
00:00 -
006. Windows – Malware Seek & Destroy – Process Explorer – Part 1.mp4
00:00 -
007. Windows – Malware Seek & Destroy – Process Explorer – Part 2.mp4
00:00 -
008. Windows – Malware Seek & Destroy – Process Tools.mp4
00:00 -
009. Windows – Malware Seek & Destroy – Sigcheck.mp4
00:00 -
010. Windows – Malware Seek & Destroy – Autoruns.mp4
00:00 -
011. Windows – Malware Seek & Destroy – Process Monitor.mp4
00:00 -
012. Windows – Malware Seek & Destroy – Network Connections.mp4
00:00 -
013. Malware Seek & Destroy – Networkx.mp4
00:00 -
014. Linux – Malware Seek & Destroy – Sysdig.mp4
00:00 -
015. Linux – Seek & Destroy Malware and Hackers – Csysdig.mp4
00:00 -
016. Linux – Seek & Destroy Malware and Hackers – debsums & unhide.mp4
00:00 -
017. Linux & Mac OS X – Malware Seek & Destroy – netstat.mp4
00:00 -
018. Linux & Mac OS X – Malware Seek & Destroy – lsof.mp4
00:00 -
019. Linux – Malware Seek & Destroy – rkhunter.mp4
00:00 -
020. Linux – Malware Seek & Destroy – Linux – Chkrootkit, Tiger, Clamav & LMD.mp4
00:00 -
021. Linux – Malware Seek & Destroy – Linux – Persistence Part 1.mp4
00:00 -
022. Linux – Malware Seek & Destroy – Linux – Persistence Part 2.mp4
00:00 -
023. Linux – Malware Seek & Destroy – Linux – Persistence Part 3.mp4
00:00 -
024. Mac – Malware Seek & Destroy – Task Explorer.mp4
00:00 -
025. Mac – Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.mp4
00:00 -
026. Mac, Linux & Windows – OSquery.mp4
00:00 -
027. Firmware Rootkits – Seek and Destroy Part 1.mp4
00:00 -
028. Firmware Rootkits – Seek and Destroy Part 2.mp4
00:00 -
029. End-Point-Protection Recovery and Remediation Technology.mp4
00:00 -
030. Encrypted Backup and Cloud Storage.mp4
00:00 -
Section Quiz
09. Operating System and Application Hardening
-
001. Goals and Learning Objectives.mp4
00:00 -
002. An Introduction to Hardening.mp4
00:00 -
003. Hardening Standards.mp4
00:00 -
004. OpenSCAP.mp4
00:00 -
005. Baseline Auditing.mp4
00:00 -
006. Windows – Hardening.mp4
00:00 -
007. Windows – Security Compliance Manager (SCM).mp4
00:00 -
008. Mac – Hardening.mp4
00:00 -
009. Linux – Hardening.mp4
00:00 -
010. Security Focused Operating Systems.mp4
00:00 -
011. Monitoring for Security Drift.mp4
00:00 -
Section Quiz
10. Secure Deleting, Evidence Elimination and Anti-Forensics
-
001. Goals and Learning Objectives.mp4
00:00 -
002. Secure File Deletion – Mechanical drives.mp4
00:00 -
003. Secure File Deletion – Solid Sate Drives.mp4
00:00 -
004. Evidence Elimination & Anti-Forensics – An Introduction.mp4
00:00 -
005. Evidence Elimination – CCleaner and Bleachit.mp4
00:00 -
006. Evidence Elimination – Virtual Memory, Swap, RAM Memory Cache and Buffer.mp4
00:00 -
007. Disk Wiping – Mechanical Drives.mp4
00:00 -
008. Disk Wiping – Solid State Drives (SSD).mp4
00:00 -
009. Scrubbing EXIF & Metadata Part 1 – Introduction.mp4
00:00 -
010. Scrubbing EXIF & Metadata Part 2 – Tools.mp4
00:00 -
011. Scrubbing EXIF & Metadata Part 3 – Guidance.mp4
00:00 -
012. Sensor Noise Camera Identification.mp4
00:00 -
Section Quiz
11. Email Security, Privacy and Anonymity
-
001. Goals and Learning Objectives.mp4
00:00 -
002. Clients, Protocols and Authentication.mp4
00:00 -
003. Email Weaknesses.mp4
00:00 -
004. PGP, GPG & Privacy.mp4
00:00 -
005. PGP & GPG Clients.mp4
00:00 -
006. Windows – PGP & GPG.mp4
00:00 -
007. Tail – PGP & GPG.mp4
00:00 -
008. PGP & GPG Weaknesses.mp4
00:00 -
009. Improving OpenPGP Security – Best Practices – Part 1.mp4
00:00 -
010. Improving OpenPGP Security – Primary and Subkeys – Part 2.mp4
00:00 -
011. Improving OpenPGP Security – SmartcardsYubikey – Part 3.mp4
00:00 -
012. Email Tracking & Exploits.mp4
00:00 -
013. Email Anonymity & Pseudonymity.mp4
00:00 -
014. TorBirdy.mp4
00:00 -
015. Remailers.mp4
00:00 -
016. Choosing an Email Provider.mp4
00:00 -
017. Email Alternatives.mp4
00:00 -
Section Quiz
12. Messengers – Security, Privacy and Anonymity
-
001. Goals and Learning Objectives.mp4
00:00 -
002. An Introduction to Instant Messengers.mp4
00:00 -
003. Instant Messenger – Signal.mp4
00:00 -
004. Instant Messengers – Chatsecure.mp4
00:00 -
005. Instant Messengers – Cryptocat.mp4
00:00 -
006. Instant Messengers – Ricochet.mp4
00:00 -
007. Instant Messengers – Other.mp4
00:00 -
008. Video and Voice Messengers – Linphone.mp4
00:00 -
009. Video and Voice Messengers – Jitsi.mp4
00:00 -
010. Video and Voice Messengers – Other.mp4
00:00 -
Section Quiz
13. Wrap Up
-
001. Congratulations!!.mp4
00:00 -
002. Certificate Of Completion for CPEs.mp4
00:00 -
003. Qubes OS.mp4
00:00 -
004. Effective Network Isolation.mp4
00:00 -
005. Socks5 proxy tunneling.mp4
00:00 -
Section Quiz
14. BONUS Section
-
001. BONUS – How to Start a Career in Cyber Security.html
00:00
Earn a certificate
Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.