This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Endpoint Security Expert - Handing Cyber Attack, Responding Malware, Securing Networks & Endpoints on Enterprise
1. INTRODUCTION
1. Welcome to Volume 4 (0:44)
2. Introduction to the Instructor_ (2:06)
3. Security Quick Win_ (11:23)
4. Target Audience (1:54)
5. Study Recommendations (4:19)
6. Course updates (0:40)
2. GOALS AND LEARNING OBJECTIVES - VOLUME 4SECTION 2
1. What is End Point Protection and why is it important (4:38)
2. Goals and Learning Objectives - Volume 4 (3:26)
3. FILE AND DISK ENCRYPTIONSECTION 3
1. Goals and Learning Objectives-FILE AND DISK ENCRYPTIONSECTION (0:44)
2. Disk Encryption _ What is it good for (7:48)
3. Disk Encryption Attacks - Cryptoalgorithms_ Brute Force Attacks _ Implementation (5:29)
4. Disk Encryption Attacks - Physical (11:17)
5. Disk Encryption Attacks - Containers_ Volumes and Partitions (2:21)
6. Windows - Disk Encryption - An Introduction (2:39)
7. Windows - Disk Encryption - Bitlocker (12:06)
8. Windows - Setting Up BitLocker (9:30)
9. Windows - Disk Encryption - VeraCrypt (11:28)
10. Windows - Disk Encryption - CipherShed_ Diskcryptor_ Symantec and Bestcrypt (3:06)
11. Windows_ Mac _ Linux - Setting up VeraCrypt (11:42)
12. Mac - Filevault2 (5:39)
13. Mac - Setting up Filevault2 (7:35)
14. Linux Whole Disk Encryption - Dm-crypt and LUKS (5:54)
15. Linux - Setting up DMCryptLUKS (5:09)
16. Linux - Encrypting the boot partition with Grub2 (4:47)
17. Self Encrypting Drives _SEDs_ (1:47)
18. Defense Against Disk Decryption Attacks (7:48)
19. File Encryption (4:13)
20. Mandatory Key Disclosure _ Plausible Deniability (7:34)
21. Nesting Crypto Systems _ Obfuscation (3:20)
22. Case Studies in Disk Decryption (2:45)
4. ANTI-VIRUS AND END-POINT-PROTECTION
1. Goals and Learning Objectives-ANTI-VIRUS AND END-POINT-PROTECTION (0:37)
2. Is Anti-Virus dead - The Threat Landscape (3:55)
3. Is Anti-Virus dead - Protection Methods (10:53)
4. Ransomware (4:17)
5. Anti-Virus and End-Point-Protection Testing (5:40)
6. The Problem With AV and EPP Testing (3:38)
7. The Best of Business End-Point-Protection _EPP_ (4:04)
8. Windows - The Best of Anti-Virus and End-Point-Protection (4:05)
9. Business End Point Protection _EPP_ (2:23)
10. Mac - XProtect (2:51)
11. Mac - The Best of Anti-Virus and End-Point-Protection (2:34)
12. Linux - The Best of Anti-Virus and End-Point-Protection (2:41)
13. Online and Second Opinion - Anti-Virus and End-Point-Protection (3:12)
14. Is Anti-Virus and End-Point-Protection Dangerous (6:35)
5. NEXT GENERATION - ANTI-VIRUS, END-POINT-PROTECTION, DETECTION & RESPONSE (EDR)
1. Goals and Learning Objectives-NEXT GENERATION (0:34)
6. END-POINT-PROTECTION TECHNOLOGY
1. Goals and Learning Objectives-END-POINT-PROTECTION TECHNOLOGY (0:40)
2. What is application and execution control (9:49)
3. Windows - Application control - ACLs_ Windows Permission Identifier _ Accessenum (6:26)
4. Windows - Application control - User Account Control _UAC_ (4:18)
5. Windows - Application control - Software Restriction Policies (4:34)
6. Windows - Application control - AppLocker (10:23)
7. Windows - Application Control - Parental controls (2:43)
8. Windows - Third Party App Control _ AV_ Appguard_ VoodooShield_ NoVirusThanks (6:35)
9. Windows - Exploitation Prevention - EMET (12:58)
10. Windows - Exploitation Prevention - Traps_ MBEA and HMPA (4:49)
11. Windows 10 - Device Guard (11:32)
12. Windows - Defender Application Guard for Microsoft Edge (2:21)
13. Linux - Access Control Models (7:45)
14. Linux - Security frameworks - AppArmor (2:13)
15. Linux - Security frameworks - SElinux (3:19)
16. Linux - Security frameworks - Grsecurity (3:59)
17. Linux - Security frameworks - PaX and more (1:40)
18. Linux _ Mac - File permissions_ POSIX and ACLs (8:03)
19. Mac - Application control - Parental controls (3:03)
20. Mac - Application control - Gatekeeper (5:23)
21. Mac - Application control - System Integrity Protection (5:42)
22. Mac - Application control - Santa (3:47)
23. Mac - Application control - Xfence _Previously Little Flocker_ (7:17)
24. Mac - Other Stuff_ (1:19)
25. The New Normal For End-Point-Protection Technology (7:50)
7. THREAT DETECTION AND MONITORING
1. Goals and Learning Objectives-THREAT DETECTION AND MONITORING (0:48)
2. A Complete Failure to Detect Threats (5:20)
3. Rethinking Honeypots (4:37)
4. CanaryTokens (18:46)
5. OpenCanary (12:19)
6. Artillery - Binary Defense (3:32)
7. Honey Drive (1:13)
8. Intrusion Detection Systems _IDS_ Part 1 - Methods (7:11)
9. Intrusion Detection Systems _IDS_ Part 2 - Snort_ Suricata_ Bro IDS _ OpenWIPS-n (4:55)
10. Host-Based Intrusion Detection - OSSEC (4:40)
11. Network Analysis - Sguil_ Xplico _ NetworkMiner (3:05)
12. File Integrity Monitoring _FIM_ and Checking Part 1 (2:58)
13. File Integrity Monitoring _FIM_ and Checking Part 2 - Tripwire and El Jefe (2:31)
14. Network Security Toolkit _NST_ (2:03)
15. Security Onion (1:17)
16. Security Information and Event Management Software _SIEM_ (2:51)
8. MALWARE AND HACKER HUNTING ON THE END-POINT
1. Goals and Learning Objectives-MALWARE AND HACKER HUNTING ON THE END-POINT (0:48)
2. Introduction to Malware and Hacker Hunting (8:20)
3. Windows - Farbar Recovery Scanner (9:20)
4. Automated Malware Removal Tools (10:41)
5. Live Rescue Operating Systems_ CDs_ and USBs (6:42)
6. Windows - Malware Seek _ Destroy - Process Explorer - Part 1 (11:33)
7. Windows - Malware Seek _ Destroy - Process Explorer - Part 2 (10:04)
8. Windows - Malware Seek _ Destroy - Process Tools (2:09)
9. Windows - Malware Seek _ Destroy - Sigcheck (2:31)
10. Windows - Malware Seek _ Destroy - Autoruns (10:09)
11. Windows - Malware Seek _ Destroy - Process Monitor (10:47)
12. Windows - Malware Seek _ Destroy - Network Connections (8:10)
13. Malware Seek _ Destroy - Networkx (2:21)
14. Linux - Malware Seek _ Destroy - Sysdig (10:27)
15. Linux - Seek _ Destroy Malware and Hackers - Csysdig (11:13)
16. Linux - Seek _ Destroy Malware and Hackers - debsums _ unhide (1:53)
17. Linux _ Mac OS X - Malware Seek _ Destroy - netstat (7:13)
18. Linux _ Mac OS X - Malware Seek _ Destroy - lsof (8:15)
19. Linux - Malware Seek _ Destroy - rkhunter (6:13)
21. Linux - Malware Seek _ Destroy - Linux - Persistence Part 1 (3:23)
22. Linux - Malware Seek _ Destroy - Linux - Persistence Part 2 (10:18)
23. Linux - Malware Seek _ Destroy - Linux - Persistence Part 3 (2:55)
24. Mac - Malware Seek _ Destroy - Task Explorer (5:21)
25. Mac - Malware Seek _ Destroy KnockKnock_ BlockBlock _ KextViewer (7:26)
26. Mac_ Linux _ Windows - OSquery (14:47)
27. Firmware Rootkits _ Seek and Destroy Part 1 (7:28)
28. Firmware Rootkits _ Seek and Destroy Part 2 (4:05)
29. End-Point-Protection Recovery and Remediation Technology (3:17)
30. Encrypted Backup and Cloud Storage (6:03)
9. OPERATING SYSTEM AND APPLICATION HARDENING
1. Goals and Learning Objectives-OPERATING SYSTEM AND APPLICATION HARDENING (0:47)
2. An Introduction to Hardening (5:28)
3. Hardening Standards (10:01)
4. OpenSCAP (12:46)
5. Baseline Auditing (3:31)
6. Windows - Hardening (1:54)
7. Windows - Security Compliance Manager _SCM_ (11:01)
8. Mac _ Hardening (1:35)
9. Linux _ Hardening (3:31)
10. Security Focused Operating Systems (4:49)
11. Monitoring for Security Drift (1:16)
10. SECURE DELETING, EVIDENCE ELIMINATION AND ANTI-FORENSICS
1. Goals and Learning Objectives-SECURE DELETING_EVIDENCE ELIMINATION AND ANTI-FORENSICS (0:43)
2. Secure File Deletion - Mechanical drives (8:10)
3. Secure File Deletion - Solid Sate Drives (6:37)
4. Evidence Elimination _ Anti-Forensics - An Introduction (4:42)
5. Evidence Elimination - CCleaner and Bleachit (7:02)
7. Disk Wiping - Mechanical Drives (5:46)
8. Disk Wiping - Solid State Drives _SSD_ (10:53)
9. Scrubbing EXIF _ Metadata Part 1 - Introduction (6:56)
10. Scrubbing EXIF _ Metadata Part 2 - Tools (5:14)
11. Scrubbing EXIF _ Metadata Part 3 - Guidance (4:36)
12. Sensor Noise Camera Identification (4:06)
11. EMAIL SECURITY, PRIVACY AND ANONYMITY
1. Goals and Learning Objectives-EMAIL SECURITY, PRIVACY AND ANONYMITY (1:05)
2. Clients_ Protocols and Authentication (13:17)
3. Email Weaknesses (13:02)
4. PGP_ GPG _ Privacy (5:50)
5. PGP _ GPG Clients (6:27)
6. Windows - PGP _ GPG (19:52)
7. Tail - PGP _ GPG (4:01)
8. PGP _ GPG Weaknesses (6:15)
9. Improving OpenPGP Security - Best Practices - Part 1 (2:32)
10. Improving OpenPGP Security - Primary and Subkeys - Part 2 (12:20)
11. Improving OpenPGP Security - SmartcardsYubikey - Part 3 (7:41)
12. Email Tracking _ Exploits (10:33)
13. Email Anonymity _ Pseudonymity (6:18)
14. TorBirdy (7:36)
15. Remailers (7:33)
16. Choosing an Email Provider (13:46)
17. Email Alternatives (3:17)
12. MESSENGERS - SECURITY, PRIVACY AND ANONYMITY
1. Goals and Learning Objectives-Messengers (0:19)
2. An Introduction to Instant Messengers (3:08)
3. Instant Messenger - Signal (2:30)
4. Instant Messengers - Chatsecure (1:38)
5. Instant Messengers - Cryptocat (0:45)
6. Instant Messengers - Ricochet (0:46)
7. Instant Messengers - Other (0:38)
8. Video and Voice Messengers - Linphone (4:28)
9. Video and Voice Messengers - Jitsi (1:40)
10. Video and Voice Messengers - Other (0:57)
13. WRAP UP
1. Congratulations__ (0:29)
2. Certificate Of Completion for CPEs (0:56)
3. Qubes OS (19:07)
4. Effective Network Isolation (12:27)
5. Socks5 proxy tunneling (10:20)
15. Security Onion
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock