What is End Point Protection? and why is it important?

Nathan House
A free video tutorial from Nathan House
Leading Cyber Security Expert
4.5 instructor rating • 7 courses • 267,038 students

Learn more from the full course

The Complete Cyber Security Course : End Point Protection!

Volume 4 :Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware

16:40:07 of on-demand video • Updated August 2020

  • An advanced practical skill-set in securing laptops, desktops and mobile devices.
  • Start a career in cyber security. Become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
English Welcome to Volume 4 where we focus on the current and possible future endpoint protection technologies used in cyber security end point protection is a very important and hot topic at the moment in the security industry. So let's first define what do we mean by the endpoint? The endpoint is simply a technical term that refers to the clients that we use. So the laptops, desktops, phones, tablets and so on. These are the endpoint and endpoint protection is the technologies installed on the endpoints that attempt to protect them from the threats and the adversaries that we face and that they face the endpoint protection technologies as you can see here, they include things like antivirus, application white listing, execution prevention, intrusion prevention, disk encryption and much more. And those are supported by mechanisms such as signatures, behavioral analysis, machine learning and artificial intelligence, all covered throughout this course to protect the endpoint. Traditionally and still commonly, people and organizations mistakenly concentrate too much effort on protecting the perimeter of the network, using technologies like firewalls, routers, network filtering. Much of the security budget is spent at the perimeter, which is a poor return on your security investment in the current threat landscape. Because what this creates is a coconut like security defense strategy. It's hard on the outside, but soft on the inside. Concentrating on securing the perimeter is not an effective security strategy anymore and it hasn't been actually for a long, long time. The cocain is completely dead. If you focus on perimeter defenses, you lack defense in depth. You're not creating multiple layers for an attacker to have to bypass. Security should be like a tough onion with multiple layers to break through devices, move around and lose the protection of the perimeter defenses, your endpoints, your laptop, tablet and phone. They don't stay on your home network or on your business network hidden behind the perimeter defenses anymore. Those days are gone. The endpoint travels, it moves. Security must travel with the asset to be effective. This is end point protection and this is why endpoint protection is so important, because it travels with the asset and protects it and adds those extra layers of protection to those devices, to those endpoints, and works in collaboration with the way we want to use the endpoints. Security must be layers of defenses that predict, prevent, detect, respond and recover from both known and unknown threats. According to 451 Research, malware is considered the biggest concern among people responsible for security within businesses. Additionally, endpoint protection has the highest estimated spend over the next couple of years. The endpoint is a big concern because humans control the endpoint and humans make mistakes to allow attackers in. Threat target the endpoint because they are easy targets, end points are used as launch points to attack. Well, the devices and with more recent trends, ransom your precious data through ransomware, which is an extremely popular, automated, effective and lucrative attack strategy, which is only going to become a bigger threat. Endpoint protection is an important battleground against ransomware and all types of attacks. In fact, security must live on the endpoint and travel with it. So endpoint protection is a hot topic. Now, businesses have already realized it's important as part of an effective security strategy and budgets are focused on it. You need to understand endpoint protection to be on the cutting edge of cybersecurity. And talking of the cutting edge, we are entering the automation age now. Jobs will be increasingly replaced by automation. Whole industries will look completely different in the lifetime of most people taking this course, the security industry will be at the forefront of change through automation. Machine learning and artificial intelligence is being adopted for both defense and attack. Right now, with endpoint protection already at the forefront of security moving into the automation age. Within ten to twenty years, cybersecurity will involve artificial intelligence endpoint technologies, defending against artificial intelligence, attack platforms. An interesting and possibly scary cyber future awaits us. So let's now dig into the course and explore the current and future endpoint protection technologies and start our journey on this course, on this volume into cybersecurity.