You are on page 1of 7

COURSE DESIGNER COURSE DESIGNER AND

TRAINER
TAUFIQUE AHMAD
YASIR SHEIKH
CO FOUNDER
SKOLAR EX - PALO ALTO NETWORKS

CYBER SECURITY :
End Point Protection
Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption,
Finding & Removing Hackers & Malware

450+ students enrolled in 2022 average rating of 9.2 by learners

5599/-
01.

WHAT YOU WILL LEARN


An advanced practical skill-set in securing laptops, desktops and mobile devices.
Start a career in cyber security. Become a cyber security specialist.
The very latest up-to-date information and methods.
You will master the selection and implementation of solid disk encryption
technology to protect devices fully from disk decryption attacks.
How to detect and monitor for threats such as malware and hackers through the
use of security through deception and detection technologies.

02.

WHAT YOU WILL GET

30+ HRS LIFETIME 1 MAJOR


LIVE VIDEO VIDEO ACCESS BOOTCAMP

2 24 X 7 LIVE INTERNSHIP
LIVE PROJECTS DISCUSSION FORUM SUPPORT
CURRICULUM

01. INTRODUCTION
Welcome to Volume 4
Introduction to the Instructor!
Security Quick Win!
Target Audience
Study Recommendations
Course updates
Cyber Security and Ethical Hacking Careers

02. GOALS AND LEARNING OBJECTIVES


What is Endpoint Protection? and why is it important?
Goals and Learning Objectives -Volume 4

03. FILE AND DISK ENCRYPTION


Goals and Learning Objectives
Disk Encryption-What is it good for?
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks
& Implementation
Disk Encryption Attacks- Physical
Disk Encryption Attacks - Containers, Volumes and Partitions
Windows Disk Encryption - An Introduction
Windows Disk Encryption - Bitlocker
Windows -Setting Up BitLocker
Windows-Disk Encryption -VeraCrypt
Windows- Disk Encryption - CipherShed, Diskcryptor, Symantec
and Bestcrypt
Windows, Mac & Linux- Setting up VeraCrypt
Mac-Filevault2
Mac Setting up Filevault2
Linux Whole Disk Encryption - Dm-crypt and LUKS
Linux- Setting up DMCypt/LUKS
Linux Encrypting the boot partition with Grub2
Self Encrypting Drives (SEDs)
Defense Against Disk Decryption Attacks
File Encryption
Mandatory Key Disclosure & Plausible Deniability
Nesting CryptoSystems & Obfuscation
Case Studies in Disk Decryption

04. ANTIVIRUS AND END-POINT-PROTECTION


Goals and Learning Objectives
Is Antivirus dead?- The Threat Landscape
Is Antivirus dead? Protection Methods
Ransomware
Antivirus and End-Point-Protection Testing
The Problem With AV and EPP Testing
The Best of Business End-Point-Protection (EPP)
Windows - The Best of Antivirus and End-Point-Protection
Business Endpoint Protection (EPP)
Mac - XProtect
Mac The Best of Antivirus and End-Point-Protection
Linux- The Best of Antivirus and End-Point-Protection
Online and Second Opinion - Anti-Virus and End-Point-
Protection
Is Antivirus and End-Point-Protection Dangerous?

05. NEXT GENERATION ANTI-VIRUS, END-POINT-PROTECTION,


DETECTION & RESPONSE (EDR)
Next Generation Anti-Virus (NG-AV) & End-Point-Protection
(NG-EPP)
EndPoint Detection and Response (EDR)
EndPoint-Protection: How it works together in layers
06. END-POINT-PROTECTION TECHNOLOGY
Goals and Learning Objectives
What is application and execution control?
Windows- Application control ACLs, Windows Permission
Identifier & Accessenum
Windows Application control - User Account Control (UAC)
Windows- Application control Software Restriction Policies
Windows- Application control AppLocker
Windows- Application Control - Parental controls
Windows- Third Party App Control-AV, Appguard,
VoodooShield, NoVirusThanks
Windows - Exploitation Prevention - EMET
Windows- Exploitation Prevention - Traps, MBEA and HMPA
Windows 10 - Device Guard
Windows-Defender Application Guard for Microsoft Edge
Linux- Access Control Models
Linux Security frameworks - AppArmor
Linux Security frameworks - SElinux
Linux - Security frameworks - Grsecurity
Linux Security frameworks - PaX and more
Linux & Mac - File permissions, POSIX and ACLs

07. THREAT DETECTION AND MONITORING


Goals and Learning Objectives
A Complete Failure to Detect Threats
Rethinking Honeypots
CanaryTokens
OpenCanary
Artillery Binary Defence
Honey Drive
Intrusion Detection Systems (IDS) Part1- Methods
Intrusion Detection Systems (1DS) Part 2 Snot, Suricata, Bro IDS
&OpenWIPS-ng
Host-Based Intrusion Detection OSSEC
Network Analysis Sguil, Xplico & NetworkMiner
File Integrity Monitoring (FIM) and Checking Part 1
File Integrity Monitoring (FIM) and Checking Part 2- Tripwire and El Jefe
Network Security Toolkit (NST)
Security Onion
Security Information and Event Management Software (SIEM)

08. OPERATING SYSTEM AND APPLICATION HARDENING


Goals and Learning Objectives
An Introduction to Hardening
Hardening Standards
OpenSCAP
Baseline Auditing
Windows- Hardening
Windows- Security Compliance Manager (SCM)
Mac-Hardening
Linux - Hardening
Security Focused Operating Systems
Monitoring for Security Drift

09. SECURE DELETING, EVIDENCE ELIMINATION AND ANTI-


FORENSICS
Goals and Learning Objectives
An Introduction to Hardening
Hardening Standards
OpenSCAP
Baseline Auditing
Windows- Hardening
Windows- Security Compliance Manager (SCM)
Mac-Hardening
Linux - Hardening
Security Focused Operating Systems
Monitoring for Security Drift
Inviting you to join our
CYBER SECURITY :
END POINT PROTECTION

portfolio worthy courses involving mastered concepts

Weekly doubt-clearing and mentor sessions

Course completion certificate

Internship and placement assistance

Regular counselling sessions and free webinar access

skolar.in skolar.in skolar-in

write to us at support@skolar.in
whatsapp: 7406554324

You might also like