Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Meditation Personal Transformation Life Purpose Coaching Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 16.5 hours on-demand video
  • 1 article
  • Full lifetime access
  • Access on mobile and TV
IT & Software Network & Security Cyber Security

The Complete Cyber Security Course : End Point Protection!

Volume 4 :Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware
Rating: 4.6 out of 54.6 (3,292 ratings)
62,700 students
Created by Nathan House
Last updated 8/2020
English
English [Auto], Indonesian [Auto], 
30-Day Money-Back Guarantee

What you'll learn

  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • Start a career in cyber security. Become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
Curated for the Udemy for Business collection

Requirements

  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
  • I recommend you watch volumes 1, 2 and 3 of this complete course before watching this volume 4 although it is not required.
  • You can take this volume as a stand-alone course.
  • Please note this is Volume 4 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

Description

Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now!

Become a cyber security specialist - Go from a beginner to advanced in this easy to follow expert course.  

Covering all the major platforms Windows, MacOS, Linux, iOS and Android.

Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks.

Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully. 

Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.

Learn how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.

We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker hunting!

Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer. 

Explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.

Plus there is more. We end by looking the extremely important topic of email and messenger security.  Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.

This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity. 

Who this course is for:

  • This course is for anyone who wants to become an expert in security, privacy, and anonymity.
  • The ideal student for this course is technically minded with an interest in how hackers hacker, how trackers track and what you can do to stop them.
  • For those who want privacy and anonymity online from hackers, corporations and governments.
  • For those interesting in the latest trends in cyber security and protection of end-points.

Featured review

Alan Probst
Alan Probst
38 courses
4 reviews
Rating: 5.0 out of 511 months ago
Just started but KNOW it is Good Stuff! Was in some health related challenges but now will be going deeper into the training. Appreciate course and instructor and can sense he is at top of his or anyone's game in field of cyber security. All The Best! Alan Probst

Course content

14 sections • 177 lectures • 16h 40m total length

  • Preview00:44
  • Preview02:06
  • Preview11:23
  • Preview01:54
  • Preview04:19
  • Preview00:40
  • Preview03:45

  • What is End Point Protection? and why is it important?
    Preview04:38
  • Preview03:26

  • Goals and Learning Objectives
    00:44
  • Disk Encryption – What is it good for?
    07:48
  • Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
    05:29
  • Preview11:17
  • Disk Encryption Attacks - Containers, Volumes and Partitions
    02:21
  • Windows - Disk Encryption - An Introduction
    02:39
  • Windows - Disk Encryption - Bitlocker
    12:06
  • Windows - Setting Up BitLocker
    09:30
  • Windows - Disk Encryption - VeraCrypt
    11:28
  • Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
    03:06
  • Windows, Mac & Linux - Setting up VeraCrypt
    11:42
  • Mac - Filevault2
    05:39
  • Mac - Setting up Filevault2
    07:35
  • Linux Whole Disk Encryption - Dm-crypt and LUKS
    05:54
  • Linux - Setting up DMCrypt/LUKS
    05:09
  • Linux - Encrypting the boot partition with Grub2
    04:47
  • Self Encrypting Drives (SEDs)
    01:47
  • Defense Against Disk Decryption Attacks
    07:48
  • File Encryption
    04:13
  • Mandatory Key Disclosure & Plausible Deniability
    07:34
  • Nesting Crypto Systems & Obfuscation
    03:20
  • Case Studies in Disk Decryption
    02:45

  • Goals and Learning Objectives
    00:37
  • Is Anti-Virus dead? - The Threat Landscape
    03:55
  • Is Anti-Virus dead? - Protection Methods
    10:53
  • Ransomware
    04:17
  • Anti-Virus and End-Point-Protection Testing
    05:40
  • The Problem With AV and EPP Testing
    03:38
  • The Best of Business End-Point-Protection (EPP)
    04:04
  • Windows - The Best of Anti-Virus and End-Point-Protection
    04:05
  • Business End Point Protection (EPP)
    02:23
  • Mac - XProtect
    02:51
  • Mac - The Best of Anti-Virus and End-Point-Protection
    02:34
  • Linux - The Best of Anti-Virus and End-Point-Protection
    02:41
  • Online and Second Opinion - Anti-Virus and End-Point-Protection
    03:12
  • Is Anti-Virus and End-Point-Protection Dangerous?
    06:35

  • Goals and Learning Objectives
    00:34
  • Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
    04:59
  • End Point Detection and Response (EDR)
    06:39
  • End-Point-Protection: How it works together in layers
    06:57

  • Goals and Learning Objectives
    00:40
  • What is application and execution control?
    09:49
  • Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
    06:26
  • Windows - Application control - User Account Control (UAC)
    04:18
  • Windows - Application control - Software Restriction Policies
    04:34
  • Windows - Application control - AppLocker
    10:23
  • Windows - Application Control - Parental controls
    02:43
  • Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
    06:35
  • Windows - Exploitation Prevention - EMET
    12:58
  • Windows - Exploitation Prevention - Traps, MBEA and HMPA
    04:49
  • Windows 10 - Device Guard
    11:32
  • Windows - Defender Application Guard for Microsoft Edge
    02:21
  • Linux - Access Control Models
    07:45
  • Linux - Security frameworks - AppArmor
    02:13
  • Linux - Security frameworks - SElinux
    03:19
  • Linux - Security frameworks - Grsecurity
    03:59
  • Linux - Security frameworks - PaX and more
    01:40
  • Linux & Mac - File permissions, POSIX and ACLs
    08:03
  • Mac - Application control - Parental controls
    03:03
  • Mac - Application control - Gatekeeper
    05:23
  • Mac - Application control - System Integrity Protection
    05:42
  • Mac - Application control - Santa
    03:47
  • Mac - Application control - Xfence (Previously Little Flocker)
    07:17
  • Mac - Other Stuff!
    01:19
  • The New Normal For End-Point-Protection Technology
    07:50
  • Cylance
    04:46

  • Goals and Learning Objectives
    00:48
  • A Complete Failure to Detect Threats
    05:20
  • Rethinking Honeypots
    04:37
  • CanaryTokens
    18:46
  • OpenCanary
    12:19
  • Artillery - Binary Defense
    03:32
  • Honey Drive
    01:13
  • Intrusion Detection Systems (IDS) Part 1 - Methods
    07:11
  • Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
    04:55
  • Host-Based Intrusion Detection - OSSEC
    04:40
  • Network Analysis - Sguil, Xplico & NetworkMiner
    03:05
  • File Integrity Monitoring (FIM) and Checking Part 1
    02:58
  • File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
    02:31
  • Network Security Toolkit (NST)
    02:03
  • Security Onion
    01:17
  • Security Information and Event Management Software (SIEM)
    02:51

  • Goals and Learning Objectives
    00:48
  • Introduction to Malware and Hacker Hunting
    08:20
  • Windows - Farbar Recovery Scanner
    09:20
  • Automated Malware Removal Tools
    10:41
  • Live Rescue Operating Systems, CDs, and USBs
    06:42
  • Preview11:33
  • Windows - Malware Seek & Destroy - Process Explorer - Part 2
    10:04
  • Windows - Malware Seek & Destroy - Process Tools
    02:09
  • Windows - Malware Seek & Destroy - Sigcheck
    02:31
  • Windows - Malware Seek & Destroy - Autoruns
    10:09
  • Windows - Malware Seek & Destroy - Process Monitor
    10:47
  • Windows - Malware Seek & Destroy - Network Connections
    08:10
  • Malware Seek & Destroy - Networkx
    02:21
  • Linux - Malware Seek & Destroy - Sysdig
    10:27
  • Linux - Seek & Destroy Malware and Hackers - Csysdig
    11:13
  • Linux - Seek & Destroy Malware and Hackers - debsums & unhide
    01:53
  • Linux & Mac OS X - Malware Seek & Destroy - netstat
    07:13
  • Linux & Mac OS X - Malware Seek & Destroy - lsof
    08:15
  • Linux - Malware Seek & Destroy - rkhunter
    06:13
  • Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
    02:00
  • Linux - Malware Seek & Destroy - Linux - Persistence Part 1
    03:23
  • Linux - Malware Seek & Destroy - Linux - Persistence Part 2
    10:18
  • Linux - Malware Seek & Destroy - Linux - Persistence Part 3
    02:55
  • Mac - Malware Seek & Destroy - Task Explorer
    05:21
  • Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
    07:26
  • Mac, Linux & Windows - OSquery
    14:47
  • Firmware Rootkits – Seek and Destroy Part 1
    07:28
  • Firmware Rootkits – Seek and Destroy Part 2
    04:05
  • End-Point-Protection Recovery and Remediation Technology
    03:17
  • Encrypted Backup and Cloud Storage
    06:03

  • Goals and Learning Objectives
    00:47
  • An Introduction to Hardening
    05:28
  • Hardening Standards
    10:01
  • OpenSCAP
    12:46
  • Baseline Auditing
    03:31
  • Windows - Hardening
    01:54
  • Windows - Security Compliance Manager (SCM)
    11:01
  • Mac – Hardening
    01:35
  • Linux – Hardening
    03:31
  • Security Focused Operating Systems
    04:49
  • Monitoring for Security Drift
    01:16

  • Goals and Learning Objectives
    00:43
  • Secure File Deletion - Mechanical drives
    08:10
  • Secure File Deletion - Solid Sate Drives
    06:37
  • Evidence Elimination & Anti-Forensics - An Introduction
    04:42
  • Evidence Elimination - CCleaner and Bleachit
    07:02
  • Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
    05:49
  • Disk Wiping - Mechanical Drives
    05:46
  • Disk Wiping - Solid State Drives (SSD)
    10:53
  • Scrubbing EXIF & Metadata Part 1 - Introduction
    06:56
  • Scrubbing EXIF & Metadata Part 2 - Tools
    05:14
  • Scrubbing EXIF & Metadata Part 3 - Guidance
    04:36
  • Sensor Noise Camera Identification
    04:06

Instructor

Nathan House
Leading Cyber Security Expert
Nathan House
  • 4.6 Instructor Rating
  • 53,205 Reviews
  • 233,146 Students
  • 7 Courses

Winner of the AI "Cyber Security Educator of the Year 2020" award.

Nathan has over 24 years experience in cyber security where I have advised  some of largest companies in the world, assuring security on  multi-million and multi-billion pound projects. He is the CEO of Station X a cyber security consultancy. More recently he acted as  the lead security consultant on a number of the UKs mobile banking and  payment solutions helping secure to date over £71Bn in transactions.

My clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of  Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he have spoken at a number of security conferences,  developed free security tools, and discovered serious security  vulnerabilities in leading applications.

Qualifications and education

★ BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
★ SCF : SABSA Chartered Architect Foundation
★ CISSP : Certified Information Systems Security Professional
★ CISA : Certified Information Systems Auditor
★ CISM : Certified Information Security Manager
★ ISO 27001 Certified ISMS Lead Auditor
★ CEH : Certified Ethical Hacker
★ OSCP : Offensive Security Certified Professional





  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.