The Complete Cyber Security Course : End Point Protection!
4.7 (423 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
12,910 students enrolled
Wishlisted Wishlist

Please confirm that you want to add The Complete Cyber Security Course : End Point Protection! to your Wishlist.

Add to Wishlist

The Complete Cyber Security Course : End Point Protection!

Volume 4 :Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware
4.7 (423 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
12,910 students enrolled
Created by Nathan House
Last updated 8/2017
English
English
Current price: $10 Original price: $195 Discount: 95% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 16.5 hours on-demand video
  • 3 Articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • Become a cyber security specialist
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
View Curriculum
Requirements
  • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
  • I recommend you watch volumes 1, 2 and 3 of this complete course before watching this volume 4 although it is not required.
  • You can take this volume as a stand-alone course.
  • Please note this is Volume 4 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.
Description

Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now!

Become a cyber security specialist - Go from a beginner to advanced in this easy to follow expert course.  

Covering all the major platforms Windows, MacOS, Linux, iOS and Android.

Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks.

Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully. 

Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.

Learn how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.

We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker hunting!

Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer. 

Explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.

Plus there is more. We end by looking the extremely important topic of email and messenger security.  Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.

This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity. 

Who is the target audience?
  • This course is for anyone who wants to become an expert in security, privacy, and anonymity.
  • The ideal student for this course is technically minded with an interest in how hackers hacker, how trackers track and what you can do to stop them.
  • For those who want privacy and anonymity online from hackers, corporations and governments.
  • For those interesting in the latest trends in cyber security and protection of end-points.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
177 Lectures
16:37:29
+
File and Disk Encryption
22 Lectures 02:14:41
Goals and Learning Objectives
00:44

Disk Encryption – What is it good for?
07:48

Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
05:29


Disk Encryption Attacks - Containers, Volumes and Partitions
02:21

Windows - Disk Encryption - An Introduction
02:39

Windows - Disk Encryption - Bitlocker
12:06

Windows - Setting Up BitLocker
09:30

Windows - Disk Encryption - VeraCrypt
11:28

Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
03:06

Windows, Mac & Linux - Setting up VeraCrypt
11:42

Mac - Filevault2
05:39

Mac - Setting up Filevault2
07:35

Linux Whole Disk Encryption - Dm-crypt and LUKS
05:54

Linux - Setting up DMCrypt/LUKS
05:09

Linux - Encrypting the boot partition with Grub2
04:47

Self Encrypting Drives (SEDs)
01:47

Defense Against Disk Decryption Attacks
07:48

File Encryption
04:13

Mandatory Key Disclosure & Plausible Deniability
07:34

Nesting Crypto Systems & Obfuscation
03:20

Case Studies in Disk Decryption
02:45
+
Anti-Virus and End-Point-Protection
14 Lectures 57:25
Goals and Learning Objectives
00:37

Is Anti-Virus dead? - The Threat Landscape
03:55

Is Anti-Virus dead? - Protection Methods
10:53

Ransomware
04:17

Anti-Virus and End-Point-Protection Testing
05:40

The Problem With AV and EPP Testing
03:38

The Best of Business End-Point-Protection (EPP)
04:04

Windows - The Best of Anti-Virus and End-Point-Protection
04:05

Business End Point Protection (EPP)
02:23

Mac - XProtect
02:51

Mac - The Best of Anti-Virus and End-Point-Protection
02:34

Linux - The Best of Anti-Virus and End-Point-Protection
02:41

Online and Second Opinion - Anti-Virus and End-Point-Protection
03:12

Is Anti-Virus and End-Point-Protection Dangerous?
06:35
+
Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
4 Lectures 19:09
Goals and Learning Objectives
00:34

Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
04:59

End Point Detection and Response (EDR)
06:39

End-Point-Protection: How it works together in layers
06:57
+
End-Point-Protection Technology
26 Lectures 02:23:14
Goals and Learning Objectives
00:40

What is application and execution control?
09:49

Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
06:26

Windows - Application control - User Account Control (UAC)
04:18

Windows - Application control - Software Restriction Policies
04:34

Windows - Application control - AppLocker
10:23

Windows - Application Control - Parental controls
02:43

Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
06:35

Windows - Exploitation Prevention - EMET
12:58

Windows - Exploitation Prevention - Traps, MBEA and HMPA
04:49

Windows 10 - Device Guard
11:32

Windows - Defender Application Guard for Microsoft Edge
02:21

Linux - Access Control Models
07:45

Linux - Security frameworks - AppArmor
02:13

Linux - Security frameworks - SElinux
03:19

Linux - Security frameworks - Grsecurity
03:59

Linux - Security frameworks - PaX and more
01:40

Linux & Mac - File permissions, POSIX and ACLs
08:03

Mac - Application control - Parental controls
03:03

Mac - Application control - Gatekeeper
05:23

Mac - Application control - System Integrity Protection
05:42

Mac - Application control - Santa
03:47

Mac - Application control - Xfence (Previously Little Flocker)
07:17

Mac - Other Stuff!
01:19

The New Normal For End-Point-Protection Technology
07:50

Cylance
04:46
+
Threat Detection and Monitoring
17 Lectures 01:18:11
Goals and Learning Objectives
00:48

A Complete Failure to Detect Threats
05:20

Rethinking Honeypots
04:37

CanaryTokens
18:46

OpenCanary
12:19

CanaryPi
00:05

Artillery - Binary Defense
03:32

Honey Drive
01:13

Intrusion Detection Systems (IDS) Part 1 - Methods
07:11

Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
04:55

Host-Based Intrusion Detection - OSSEC
04:40

Network Analysis - Sguil, Xplico & NetworkMiner
03:05

File Integrity Monitoring (FIM) and Checking Part 1
02:58

File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
02:31

Network Security Toolkit (NST)
02:03

Security Onion
01:17

Security Information and Event Management Software (SIEM)
02:51
+
Malware and Hacker Hunting on the End-Point
30 Lectures 03:25:52
Goals and Learning Objectives
00:48

Introduction to Malware and Hacker Hunting
08:20

Windows - Farbar Recovery Scanner
09:20

Automated Malware Removal Tools
10:41

Live Rescue Operating Systems, CDs, and USBs
06:42


Windows - Malware Seek & Destroy - Process Explorer - Part 2
10:04

Windows - Malware Seek & Destroy - Process Tools
02:09

Windows - Malware Seek & Destroy - Sigcheck
02:31

Windows - Malware Seek & Destroy - Autoruns
10:09

Windows - Malware Seek & Destroy - Process Monitor
10:47

Windows - Malware Seek & Destroy - Network Connections
08:10

Malware Seek & Destroy - Networkx
02:21

Linux - Malware Seek & Destroy - Sysdig
10:27

Linux - Seek & Destroy Malware and Hackers - Csysdig
11:13

Linux - Seek & Destroy Malware and Hackers - debsums & unhide
01:53

Linux & Mac OS X - Malware Seek & Destroy - netstat
07:13

Linux & Mac OS X - Malware Seek & Destroy - lsof
08:15

Linux - Malware Seek & Destroy - rkhunter
06:13

Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
02:00

Linux - Malware Seek & Destroy - Linux - Persistence Part 1
03:23

Linux - Malware Seek & Destroy - Linux - Persistence Part 2
10:18

Linux - Malware Seek & Destroy - Linux - Persistence Part 3
02:55

Mac - Malware Seek & Destroy - Task Explorer
05:21

Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
07:26

Mac, Linux & Windows - OSquery
14:47

Firmware Rootkits – Seek and Destroy Part 1
07:28

Firmware Rootkits – Seek and Destroy Part 2
04:05

End-Point-Protection Recovery and Remediation Technology
03:17

Encrypted Backup and Cloud Storage
06:03
+
Operating System and Application Hardening
11 Lectures 56:39
Goals and Learning Objectives
00:47

An Introduction to Hardening
05:28

Hardening Standards
10:01

OpenSCAP
12:46

Baseline Auditing
03:31

Windows - Hardening
01:54

Windows - Security Compliance Manager (SCM)
11:01

Mac – Hardening
01:35

Linux – Hardening
03:31

Security Focused Operating Systems
04:49

Monitoring for Security Drift
01:16
+
Secure Deleting, Evidence Elimination and Anti-Forensics
12 Lectures 01:10:34
Goals and Learning Objectives
00:43

Secure File Deletion - Mechanical drives
08:10

Secure File Deletion - Solid Sate Drives
06:37

Evidence Elimination & Anti-Forensics - An Introduction
04:42

Evidence Elimination - CCleaner and Bleachit
07:02

Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
05:49

Disk Wiping - Mechanical Drives
05:46

Disk Wiping - Solid State Drives (SSD)
10:53

Scrubbing EXIF & Metadata Part 1 - Introduction
06:56

Scrubbing EXIF & Metadata Part 2 - Tools
05:14

Scrubbing EXIF & Metadata Part 3 - Guidance
04:36

Sensor Noise Camera Identification
04:06
4 More Sections
About the Instructor
Nathan House
4.6 Average rating
7,245 Reviews
37,718 Students
5 Courses
Leading Cyber Security Expert

I have over 24 years experience in cyber security where I have advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. I am the CEO of Station X a cyber security consultancy. More recently I acted as the lead security consultant on a number of the UKs mobile banking and payment solutions helping secure to date over £71Bn in transactions.

My clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years I have spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications.

Qualifications and education

★ BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
★ SCF : SABSA Chartered Architect Foundation
★ CISSP : Certified Information Systems Security Professional
★ CISA : Certified Information Systems Auditor
★ CISM : Certified Information Security Manager
★ ISO 27001 Certified ISMS Lead Auditor
★ CEH : Certified Ethical Hacker
★ OSCP : Offensive Security Certified Professional