Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай The Complete Cyber Security Course : End Point Protection!, а также все другие курсы, прямо сейчас!
Премиум
  • Урок 1. 00:00:45
    Welcome to Volume 4
  • Урок 2. 00:02:07
    Introduction to the Instructor!
  • Урок 3. 00:11:25
    Security Quick Win!
  • Урок 4. 00:01:55
    Target Audience
  • Урок 5. 00:04:20
    Study Recommendations
  • Урок 6. 00:00:41
    Course updates
  • Урок 7. 00:04:39
    What is End Point Protection? and why is it important?
  • Урок 8. 00:03:27
    Goals and Learning Objectives - Volume 4
  • Урок 9. 00:00:46
    Goals and Learning Objectives
  • Урок 10. 00:07:49
    Disk Encryption – What is it good for?
  • Урок 11. 00:05:30
    Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
  • Урок 12. 00:11:18
    Disk Encryption Attacks - Physical
  • Урок 13. 00:02:22
    Disk Encryption Attacks - Containers, Volumes and Partitions
  • Урок 14. 00:02:41
    Windows - Disk Encryption - An Introduction
  • Урок 15. 00:12:08
    Windows - Disk Encryption - Bitlocker
  • Урок 16. 00:09:31
    Windows - Setting Up BitLocker
  • Урок 17. 00:11:29
    Windows - Disk Encryption - VeraCrypt
  • Урок 18. 00:03:07
    Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
  • Урок 19. 00:11:43
    Windows, Mac & Linux - Setting up VeraCrypt
  • Урок 20. 00:05:40
    Mac - Filevault2
  • Урок 21. 00:07:36
    Mac - Setting up Filevault2
  • Урок 22. 00:05:56
    Linux Whole Disk Encryption - Dm-crypt and LUKS
  • Урок 23. 00:05:10
    Linux - Setting up DMCrypt/LUKS
  • Урок 24. 00:04:48
    Linux - Encrypting the boot partition with Grub2
  • Урок 25. 00:01:48
    Self Encrypting Drives (SEDs)
  • Урок 26. 00:07:49
    Defense Against Disk Decryption Attacks
  • Урок 27. 00:04:14
    File Encryption
  • Урок 28. 00:07:36
    Mandatory Key Disclosure & Plausible Deniability
  • Урок 29. 00:03:21
    Nesting Crypto Systems & Obfuscation
  • Урок 30. 00:02:47
    Case Studies in Disk Decryption
  • Урок 31. 00:00:39
    Goals and Learning Objectives
  • Урок 32. 00:03:56
    Is Anti-Virus dead? - The Threat Landscape
  • Урок 33. 00:10:54
    Is Anti-Virus dead? - Protection Methods
  • Урок 34. 00:04:18
    Ransomware
  • Урок 35. 00:05:41
    Anti-Virus and End-Point-Protection Testing
  • Урок 36. 00:03:39
    The Problem With AV and EPP Testing
  • Урок 37. 00:04:05
    The Best of Business End-Point-Protection (EPP)
  • Урок 38. 00:04:06
    Windows - The Best of Anti-Virus and End-Point-Protection
  • Урок 39. 00:02:24
    Business End Point Protection (EPP)
  • Урок 40. 00:02:52
    Mac - XProtect
  • Урок 41. 00:02:35
    Mac - The Best of Anti-Virus and End-Point-Protection
  • Урок 42. 00:02:42
    Linux - The Best of Anti-Virus and End-Point-Protection
  • Урок 43. 00:03:13
    Online and Second Opinion - Anti-Virus and End-Point-Protection
  • Урок 44. 00:06:36
    Is Anti-Virus and End-Point-Protection Dangerous?
  • Урок 45. 00:00:35
    Goals and Learning Objectives
  • Урок 46. 00:05:00
    Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
  • Урок 47. 00:06:40
    End Point Detection and Response (EDR)
  • Урок 48. 00:06:58
    End-Point-Protection: How it works together in layers
  • Урок 49. 00:00:41
    Goals and Learning Objectives
  • Урок 50. 00:09:50
    What is application and execution control?
  • Урок 51. 00:06:28
    Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
  • Урок 52. 00:04:19
    Windows - Application control - User Account Control (UAC)
  • Урок 53. 00:04:35
    Windows - Application control - Software Restriction Policies
  • Урок 54. 00:10:24
    Windows - Application control - AppLocker
  • Урок 55. 00:02:44
    Windows - Application Control - Parental controls
  • Урок 56. 00:06:36
    Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
  • Урок 57. 00:12:59
    Windows - Exploitation Prevention - EMET
  • Урок 58. 00:04:50
    Windows - Exploitation Prevention - Traps, MBEA and HMPA
  • Урок 59. 00:11:34
    Windows 10 - Device Guard
  • Урок 60. 00:02:23
    Windows - Defender Application Guard for Microsoft Edge
  • Урок 61. 00:07:46
    Linux - Access Control Models
  • Урок 62. 00:02:14
    Linux - Security frameworks - AppArmor
  • Урок 63. 00:03:20
    Linux - Security frameworks - SElinux
  • Урок 64. 00:04:00
    Linux - Security frameworks - Grsecurity
  • Урок 65. 00:01:41
    Linux - Security frameworks - PaX and more
  • Урок 66. 00:08:04
    Linux & Mac - File permissions, POSIX and ACLs
  • Урок 67. 00:03:05
    Mac - Application control - Parental controls
  • Урок 68. 00:05:24
    Mac - Application control - Gatekeeper
  • Урок 69. 00:05:43
    Mac - Application control - System Integrity Protection
  • Урок 70. 00:03:48
    Mac - Application control - Santa
  • Урок 71. 00:07:19
    Mac - Application control - Xfence (Previously Little Flocker)
  • Урок 72. 00:01:20
    Mac - Other Stuff!
  • Урок 73. 00:07:51
    The New Normal For End-Point-Protection Technology
  • Урок 74. 00:04:47
    Cylance
  • Урок 75. 00:00:49
    Goals and Learning Objectives
  • Урок 76. 00:05:21
    A Complete Failure to Detect Threats
  • Урок 77. 00:04:38
    Rethinking Honeypots
  • Урок 78. 00:18:47
    CanaryTokens
  • Урок 79. 00:12:20
    OpenCanary
  • Урок 80. 00:03:33
    Artillery - Binary Defense
  • Урок 81. 00:01:14
    Honey Drive
  • Урок 82. 00:07:12
    Intrusion Detection Systems (IDS) Part 1 - Methods
  • Урок 83. 00:04:56
    Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
  • Урок 84. 00:04:41
    Host-Based Intrusion Detection - OSSEC
  • Урок 85. 00:03:06
    Network Analysis - Sguil, Xplico & NetworkMiner
  • Урок 86. 00:02:59
    File Integrity Monitoring (FIM) and Checking Part 1
  • Урок 87. 00:02:32
    File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
  • Урок 88. 00:02:05
    Network Security Toolkit (NST)
  • Урок 89. 00:01:18
    Security Onion
  • Урок 90. 00:02:52
    Security Information and Event Management Software (SIEM)
  • Урок 91. 00:00:50
    Goals and Learning Objectives
  • Урок 92. 00:08:21
    Introduction to Malware and Hacker Hunting
  • Урок 93. 00:09:21
    Windows - Farbar Recovery Scanner
  • Урок 94. 00:10:42
    Automated Malware Removal Tools
  • Урок 95. 00:06:43
    Live Rescue Operating Systems, CDs, and USBs
  • Урок 96. 00:11:34
    Windows - Malware Seek & Destroy - Process Explorer - Part 1
  • Урок 97. 00:10:05
    Windows - Malware Seek & Destroy - Process Explorer - Part 2
  • Урок 98. 00:02:10
    Windows - Malware Seek & Destroy - Process Tools
  • Урок 99. 00:02:32
    Windows - Malware Seek & Destroy - Sigcheck
  • Урок 100. 00:10:10
    Windows - Malware Seek & Destroy - Autoruns
  • Урок 101. 00:10:48
    Windows - Malware Seek & Destroy - Process Monitor
  • Урок 102. 00:08:12
    Windows - Malware Seek & Destroy - Network Connections
  • Урок 103. 00:02:22
    Malware Seek & Destroy - Networkx
  • Урок 104. 00:10:28
    Linux - Malware Seek & Destroy - Sysdig
  • Урок 105. 00:11:14
    Linux - Seek & Destroy Malware and Hackers - Csysdig
  • Урок 106. 00:01:54
    Linux - Seek & Destroy Malware and Hackers - debsums & unhide
  • Урок 107. 00:07:14
    Linux & Mac OS X - Malware Seek & Destroy - netstat
  • Урок 108. 00:08:16
    Linux & Mac OS X - Malware Seek & Destroy - lsof
  • Урок 109. 00:06:14
    Linux - Malware Seek & Destroy - rkhunter
  • Урок 110. 00:02:01
    Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
  • Урок 111. 00:03:24
    Linux - Malware Seek & Destroy - Linux - Persistence Part 1
  • Урок 112. 00:10:19
    Linux - Malware Seek & Destroy - Linux - Persistence Part 2
  • Урок 113. 00:02:57
    Linux - Malware Seek & Destroy - Linux - Persistence Part 3
  • Урок 114. 00:05:23
    Mac - Malware Seek & Destroy - Task Explorer
  • Урок 115. 00:07:27
    Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
  • Урок 116. 00:14:48
    Mac, Linux & Windows - OSquery
  • Урок 117. 00:07:29
    Firmware Rootkits – Seek and Destroy Part 1
  • Урок 118. 00:04:06
    Firmware Rootkits – Seek and Destroy Part 2
  • Урок 119. 00:03:18
    End-Point-Protection Recovery and Remediation Technology
  • Урок 120. 00:06:04
    Encrypted Backup and Cloud Storage
  • Урок 121. 00:00:48
    Goals and Learning Objectives
  • Урок 122. 00:05:29
    An Introduction to Hardening
  • Урок 123. 00:10:02
    Hardening Standards
  • Урок 124. 00:12:47
    OpenSCAP
  • Урок 125. 00:03:32
    Baseline Auditing
  • Урок 126. 00:01:55
    Windows - Hardening
  • Урок 127. 00:11:02
    Windows - Security Compliance Manager (SCM)
  • Урок 128. 00:01:36
    Mac – Hardening
  • Урок 129. 00:03:32
    Linux – Hardening
  • Урок 130. 00:04:50
    Security Focused Operating Systems
  • Урок 131. 00:01:17
    Monitoring for Security Drift
  • Урок 132. 00:00:44
    Goals and Learning Objectives
  • Урок 133. 00:08:11
    Secure File Deletion - Mechanical drives
  • Урок 134. 00:06:38
    Secure File Deletion - Solid Sate Drives
  • Урок 135. 00:04:43
    Evidence Elimination & Anti-Forensics - An Introduction
  • Урок 136. 00:07:03
    Evidence Elimination - CCleaner and Bleachit
  • Урок 137. 00:05:50
    Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
  • Урок 138. 00:05:47
    Disk Wiping - Mechanical Drives
  • Урок 139. 00:10:54
    Disk Wiping - Solid State Drives (SSD)
  • Урок 140. 00:06:57
    Scrubbing EXIF & Metadata Part 1 - Introduction
  • Урок 141. 00:05:15
    Scrubbing EXIF & Metadata Part 2 - Tools
  • Урок 142. 00:04:37
    Scrubbing EXIF & Metadata Part 3 - Guidance
  • Урок 143. 00:04:07
    Sensor Noise Camera Identification
  • Урок 144. 00:01:06
    Goals and Learning Objectives
  • Урок 145. 00:13:18
    Clients, Protocols and Authentication
  • Урок 146. 00:13:03
    Email Weaknesses
  • Урок 147. 00:05:51
    PGP, GPG & Privacy
  • Урок 148. 00:06:29
    PGP & GPG Clients
  • Урок 149. 00:19:53
    Windows - PGP & GPG
  • Урок 150. 00:04:02
    Tail - PGP & GPG
  • Урок 151. 00:06:16
    PGP & GPG Weaknesses
  • Урок 152. 00:02:33
    Improving OpenPGP Security - Best Practices - Part 1
  • Урок 153. 00:12:21
    Improving OpenPGP Security - Primary and Subkeys - Part 2
  • Урок 154. 00:07:43
    Improving OpenPGP Security - Smartcards/Yubikey - Part 3
  • Урок 155. 00:10:34
    Email Tracking & Exploits
  • Урок 156. 00:06:19
    Email Anonymity & Pseudonymity
  • Урок 157. 00:07:37
    TorBirdy
  • Урок 158. 00:07:35
    Remailers
  • Урок 159. 00:13:47
    Choosing an Email Provider
  • Урок 160. 00:03:18
    Email Alternatives
  • Урок 161. 00:00:20
    Goals and Learning Objectives
  • Урок 162. 00:03:09
    An Introduction to Instant Messengers
  • Урок 163. 00:02:31
    Instant Messenger - Signal
  • Урок 164. 00:01:40
    Instant Messengers - Chatsecure
  • Урок 165. 00:00:46
    Instant Messengers - Cryptocat
  • Урок 166. 00:00:47
    Instant Messengers - Ricochet
  • Урок 167. 00:00:39
    Instant Messengers - Other
  • Урок 168. 00:04:29
    Video and Voice Messengers - Linphone
  • Урок 169. 00:01:41
    Video and Voice Messengers - Jitsi
  • Урок 170. 00:00:58
    Video and Voice Messengers - Other
  • Урок 171. 00:00:30
    Congratulations!!
  • Урок 172. 00:00:57
    Certificate Of Completion for CPEs
  • Урок 173. 00:19:08
    Qubes OS
  • Урок 174. 00:12:28
    Effective Network Isolation
  • Урок 175. 00:10:21
    Socks5 proxy tunneling