- Welcome to Volume 4
- Introduction to the Instructor!
- Security Quick Win!
- Target Audience
- Study Recommendations
- Course updates
- Cyber Security and Ethical Hacking Careers
- What is End Point Protection? and why is it important?
- Goals and Learning Objectives - Volume 4
- Goals and Learning Objectives
- Disk Encryption – What is it good for?
- Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
- Disk Encryption Attacks - Physical
- Disk Encryption Attacks - Containers, Volumes and Partitions
- Windows - Disk Encryption - An Introduction
- Windows - Disk Encryption - Bitlocker
- Windows - Setting Up BitLocker
- Windows - Disk Encryption - VeraCrypt
- Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
- Windows, Mac & Linux - Setting up VeraCrypt
- Mac - Filevault2
- Mac - Setting up Filevault2
- Linux Whole Disk Encryption - Dm-crypt and LUKS
- Linux - Setting up DMCrypt/LUKS
- Linux - Encrypting the boot partition with Grub2
- Self Encrypting Drives (SEDs)
- Defense Against Disk Decryption Attacks
- File Encryption
- Mandatory Key Disclosure & Plausible Deniability
- Nesting Crypto Systems & Obfuscation
- Case Studies in Disk Decryption
- Goals and Learning Objectives
- Is Anti-Virus dead? - The Threat Landscape
- Is Anti-Virus dead? - Protection Methods
- Ransomware
- Anti-Virus and End-Point-Protection Testing
- The Problem With AV and EPP Testing
- The Best of Business End-Point-Protection (EPP)
- Windows - The Best of Anti-Virus and End-Point-Protection
- Business End Point Protection (EPP)
- Mac - XProtect
- Mac - The Best of Anti-Virus and End-Point-Protection
- Linux - The Best of Anti-Virus and End-Point-Protection
- Online and Second Opinion - Anti-Virus and End-Point-Protection
- Is Anti-Virus and End-Point-Protection Dangerous?
- Goals and Learning Objectives
- Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
- End Point Detection and Response (EDR)
- End-Point-Protection: How it works together in layers
- Goals and Learning Objectives
- What is application and execution control?
- Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
- Windows - Application control - User Account Control (UAC)
- Windows - Application control - Software Restriction Policies
- Windows - Application control - AppLocker
- Windows - Application Control - Parental controls
- Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
- Windows - Exploitation Prevention - EMET
- Windows - Exploitation Prevention - Traps, MBEA and HMPA
- Windows 10 - Device Guard
- Windows - Defender Application Guard for Microsoft Edge
- Linux - Access Control Models
- Linux - Security frameworks - AppArmor
- Linux - Security frameworks - SElinux
- Linux - Security frameworks - Grsecurity
- Linux - Security frameworks - PaX and more
- Linux & Mac - File permissions, POSIX and ACLs
- Mac - Application control - Parental controls
- Mac - Application control - Gatekeeper
- Mac - Application control - System Integrity Protection
- Mac - Application control - Santa
- Mac - Application control - Xfence (Previously Little Flocker)
- Mac - Other Stuff!
- The New Normal For End-Point-Protection Technology
- Cylance
- Goals and Learning Objectives
- A Complete Failure to Detect Threats
- Rethinking Honeypots
- CanaryTokens
- OpenCanary
- Artillery - Binary Defense
- Honey Drive
- Intrusion Detection Systems (IDS) Part 1 - Methods
- Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
- Host-Based Intrusion Detection - OSSEC
- Network Analysis - Sguil, Xplico & NetworkMiner
- File Integrity Monitoring (FIM) and Checking Part 1
- File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
- Network Security Toolkit (NST)
- Security Onion
- Security Information and Event Management Software (SIEM)
- Goals and Learning Objectives