Introduction
  • Welcome to Volume 4
  • Introduction to the Instructor!
  • Security Quick Win!
  • Target Audience
  • Study Recommendations
  • Course updates
  • Cyber Security and Ethical Hacking Careers
Goals and Learning Objectives - Volume 4
  • What is End Point Protection? and why is it important?
  • Goals and Learning Objectives - Volume 4
File and Disk Encryption
  • Goals and Learning Objectives
  • Disk Encryption – What is it good for?
  • Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
  • Disk Encryption Attacks - Physical
  • Disk Encryption Attacks - Containers, Volumes and Partitions
  • Windows - Disk Encryption - An Introduction
  • Windows - Disk Encryption - Bitlocker
  • Windows - Setting Up BitLocker
  • Windows - Disk Encryption - VeraCrypt
  • Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
  • Windows, Mac & Linux - Setting up VeraCrypt
  • Mac - Filevault2
  • Mac - Setting up Filevault2
  • Linux Whole Disk Encryption - Dm-crypt and LUKS
  • Linux - Setting up DMCrypt/LUKS
  • Linux - Encrypting the boot partition with Grub2
  • Self Encrypting Drives (SEDs)
  • Defense Against Disk Decryption Attacks
  • File Encryption
  • Mandatory Key Disclosure & Plausible Deniability
  • Nesting Crypto Systems & Obfuscation
  • Case Studies in Disk Decryption
Anti-Virus and End-Point-Protection
  • Goals and Learning Objectives
  • Is Anti-Virus dead? - The Threat Landscape
  • Is Anti-Virus dead? - Protection Methods
  • Ransomware
  • Anti-Virus and End-Point-Protection Testing
  • The Problem With AV and EPP Testing
  • The Best of Business End-Point-Protection (EPP)
  • Windows - The Best of Anti-Virus and End-Point-Protection
  • Business End Point Protection (EPP)
  • Mac - XProtect
  • Mac - The Best of Anti-Virus and End-Point-Protection
  • Linux - The Best of Anti-Virus and End-Point-Protection
  • Online and Second Opinion - Anti-Virus and End-Point-Protection
  • Is Anti-Virus and End-Point-Protection Dangerous?
Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
  • Goals and Learning Objectives
  • Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
  • End Point Detection and Response (EDR)
  • End-Point-Protection: How it works together in layers
End-Point-Protection Technology
  • Goals and Learning Objectives
  • What is application and execution control?
  • Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
  • Windows - Application control - User Account Control (UAC)
  • Windows - Application control - Software Restriction Policies
  • Windows - Application control - AppLocker
  • Windows - Application Control - Parental controls
  • Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
  • Windows - Exploitation Prevention - EMET
  • Windows - Exploitation Prevention - Traps, MBEA and HMPA
  • Windows 10 - Device Guard
  • Windows - Defender Application Guard for Microsoft Edge
  • Linux - Access Control Models
  • Linux - Security frameworks - AppArmor
  • Linux - Security frameworks - SElinux
  • Linux - Security frameworks - Grsecurity
  • Linux - Security frameworks - PaX and more
  • Linux & Mac - File permissions, POSIX and ACLs
  • Mac - Application control - Parental controls
  • Mac - Application control - Gatekeeper
  • Mac - Application control - System Integrity Protection
  • Mac - Application control - Santa
  • Mac - Application control - Xfence (Previously Little Flocker)
  • Mac - Other Stuff!
  • The New Normal For End-Point-Protection Technology
  • Cylance
Threat Detection and Monitoring
  • Goals and Learning Objectives
  • A Complete Failure to Detect Threats
  • Rethinking Honeypots
  • CanaryTokens
  • OpenCanary
  • Artillery - Binary Defense
  • Honey Drive
  • Intrusion Detection Systems (IDS) Part 1 - Methods
  • Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
  • Host-Based Intrusion Detection - OSSEC
  • Network Analysis - Sguil, Xplico & NetworkMiner
  • File Integrity Monitoring (FIM) and Checking Part 1
  • File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
  • Network Security Toolkit (NST)
  • Security Onion
  • Security Information and Event Management Software (SIEM)
Malware and Hacker Hunting on the End-Point
  • Goals and Learning Objectives