چه چیزی یاد خواهید گرفت؟
مهارت های پایه کار با کامپیوتر، سیستم، اینترنت
دربارۀ این دوره
The Complete Cyber Security Course End Point Protection ، نام مجموعه آموزش تصویری در زمینه شبکه و امنیت و در شاخه امنیت سایبری و در موضوع End Point Protection می باشد. این دوره که به عنوان دوره شماره چهارم مجموعه آموزش های امنیت سایبری بشمار می رود سطح پیشرفته ای از مسائل را هدف قرار داده است.
پیشنهاد شده توسط شرکت های برتر
شرکت های ممتاز این دوره را به کارکنان خود توصیه کرده اند.
پرسش ها (0)
Introduction
7 بخش
1Welcome to Volume 4
0 bytes
2Introduction to the Instructor
0 bytes
3Security Quick Win
0 bytes
4Target Audience
0 bytes
5Study Recommendations
0 bytes
6Course updates
0 bytes
7Cyber Security and Ethical Hacking Careers
0 bytes
Goals and Learning Objectives _ Volume 4
2 بخش
1What is End Point Protection and why is it important
0 bytes
2Goals and Learning Objectives Volume 4
0 bytes
File and Disk Encryption
21 بخش
1Goals and Learning Objectives
0 bytes
2Goals and Learning Objectives Volume 4
0 bytes
3Disk Encryption Attacks Crypto algorithms Brute ForceAttack s& Implementation
0 bytes
4Disk Encryption Attacks Physical
0 bytes
5Disk Encryption Attacks Containers Volumesand Partitions
0 bytes
6Windows Disk Encryption Bit locker
0 bytes
7Windows Setting Up BitLocker
0 bytes
8Windows Disk Encryption Vera Crypt
0 bytes
9Windows Disk Encryption CipherShed Diskcryptor Symantec and Bestcrypt
0 bytes
10Windows Mac & Linux Setting up VeraCrypt
0 bytes
11Mac File vault 2
0 bytes
12Mac Setting up Filevault 2
0 bytes
13Linux Whole Disk Encryption Dmcryptand LUKS
0 bytes
14Linux Setting up DMCryptLUKS
0 bytes
15Linux Encrypting the bootpartition with Grub2
0 bytes
16Self Encrypting Drives
0 bytes
17Defense Against Disk Decryption Attacks
0 bytes
18File Encryption
0 bytes
19Mandatory Key Disclosure & Plausible Deniability
0 bytes
20Nesting Crypto Systems & Obfuscation
0 bytes
21Case Studies in Disk Decryption
0 bytes
Anti-Virus and End-Point-Protection
14 بخش
1Goals and Learning Objectives
0 bytes
2Is Anti Virus dead The Threat Landscape
0 bytes
3Is Anti Virus dead Protection Methods
0 bytes
4Ransom ware
0 bytes
5Anti Virus and End Point Protection Testing
0 bytes
6The Problem With AV and EPP Testing
0 bytes
7The Best of Business End Point Protection (EPP)
0 bytes
8Windows The Best of Anti Virus and End Point Protection
0 bytes
9Business End Point Protection (EPP)
0 bytes
10Mac X Protect
0 bytes
11Mac TheBest of AntiVirus and End Point Protection
0 bytes
12Linux The Best of AntiVirus and EndPoint Protection
0 bytes
13Online and Second Opinion AntiVirus and End Point Protection
0 bytes
14Is AntiVirus and EndPoint Protection Dangerous
0 bytes
Next Generation-Anti-Virus, End-Point-Protection
4 بخش
1Goals and Learning Objectives
0 bytes
2Next Generation AntiVirus (NGAV) & EndPoint Protection (NGEPP)
0 bytes
3EndPoint Detection and Response (EDR)
0 bytes
4EndPoint Protection How it works together in layers
0 bytes
End-Piont-Potection Technology
25 بخش
1Goals and Learning Objectives
0 bytes
2What is application and execution control
0 bytes
3Windows Application control ACLs Windows Permission Identifier & Accessenum
0 bytes
4Windows Application control User Account Control (UAC)
0 bytes
5Windows Application control Software Restriction Policies
0 bytes
6Windows Application control App Locker
0 bytes
7Windows Application Control Parental controls
0 bytes
8Windows Exploitation Prevention EMET
0 bytes
9Windows Exploitation Prevention Traps MBEA and HMPA
0 bytes
10Windows 10 Device Guard
0 bytes
12Windows Defender Application Guard for Microsoft Edge
0 bytes
12Linux Access Control Models
0 bytes
13Linux Security frame works App Armor
0 bytes
14Linux Security frameworks SElinux
0 bytes
15Linux Security frameworks Gr security
0 bytes
16Linux Security frameworks PaX and more
0 bytes
17Linux&MacFilepermissionsPOSIXandACLs
0 bytes
18Mac Application control Parental controls
0 bytes
19MacApplicationcontrolGatekeeper
0 bytes
20Mac Application control System Integrity Protection
0 bytes
21Mac Application control Santa
0 bytes
22Mac Application control X fence (PreviouslyLittleFlocker)
0 bytes
23Mac Other Stuff
0 bytes
24The New Normal For EndPoint Protection Technology
0 bytes
25Cylance
0 bytes
Threat Detection and Monitoring
16 بخش
1Goals and Learning Objectives
0 bytes
2A Complete Failure to Detect Threats
0 bytes
3Rethinking Honey pots
0 bytes
4Canary Tokens
0 bytes
5Open Canary
0 bytes
6Artillery Binary Defense
0 bytes
7Honey Drive
0 bytes
8Intrusion Detection Systems (IDS) Part1 Methods
0 bytes
9Intrusion Detection Systems (IDS) Part2 Snort Suricata BroIDS & Open WIPSn
0 bytes
10Host Based Intrusion Detection OSSEC
0 bytes
11Network Analysis SguilXplico & Network Miner
0 bytes
12File Integrity Monitoring (FIM) and Checking Part1
0 bytes
13File Integrity Monitoring(FIM) and Checking Part2 Tripwire and ElJefe
0 bytes
14Network Security Toolkit (NST)
0 bytes
15Security Onion
0 bytes
16Security Information and Event Management Software (SIEM)
0 bytes
Malware and Hacker Hunting on the End-point
28 بخش
1Goals and Learning Objectives
0 bytes
2Introduction to Malware and Hacker Hunting
0 bytes
3Windows Farbar Recovery Scanner
0 bytes
4Automated Malware Removal Tools
0 bytes
5Live Rescue Operating Systems CDs and USBs
0 bytes
6Windows Malware Seek & Destroy Process Explorer Part1
0 bytes
7Windows Malware Seek & Destroy Process Explorer Part2
0 bytes
8Windows Malware Seek & Destroy Process Tools
0 bytes
9Windows Malware Seek & DestroySig check
0 bytes
10Windows Malware Seek & Destroy Autoruns
0 bytes
11Windows Malware Seek & Destroy Process Monitor
0 bytes
12Windows Malware Seek & Destroy Network Connections
0 bytes
13Malware Seek & Destroy Networkx
0 bytes
14Linux Malware Seek & Destroy Sysdig
0 bytes
15Linux Seek & Destroy Malware and Hackers Csysdig
0 bytes
16Linux Seek & Destroy Malware and Hackers debsums & unhide
0 bytes
17Linux & Mac OSX Malware Seek & Destroy net stat
0 bytes
18Linux & Mac OSX Malware Seek & Destroylsof
0 bytes
19Linux Malware Seek & Destroyrk hunter
0 bytes
20Linux Malware Seek & Destroy Linux Chkroot kit Tiger Clamav & LMD
0 bytes
21Linux Malware Seek & Destroy Linux Persistence Part1
0 bytes
22Linux Malware Seek & Destroy Linux Persistence Part2
0 bytes
23Linux Malware Seek & Destroy Linux Persistence Part3
0 bytes
24Mac Malware Seek & Destroy Task Explorer
0 bytes
25Mac Malware Seek & Destroy Knock Knock Block Block & Kext Viewer
0 bytes
26Mac Linux & Windows O Squery
0 bytes
27End Point Protection Recovery and Remediation Technology
0 bytes
28Encrypted Backup and Cloud Storage
0 bytes
Operating System and Application Hardening
9 بخش
1Goals and Learning Objectives
0 bytes
2An Introduction to Hardening
0 bytes
3Hardening Standards
0 bytes
4Open SCAP
0 bytes
5Base line Auditing
0 bytes
6Windows Hardening
0 bytes
7Windows Security Compliance Manager (SCM)
0 bytes
8Security Focused Operating Systems
0 bytes
9Monitoring for Security Drift
0 bytes
Secure Deleting, Evidence Elimination and Anti-Forensics
12 بخش
1Goals and Learning Objectives
0 bytes
2Secure File Deletion Mechanical drives
0 bytes
3Secure File Deletion Solid SateDrives
0 bytes
4Evidence Elimination & Anti Forensics An Introduction
0 bytes
5Evidence Elimination Cleaner and Bleachit
0 bytes
6Evidence Elimination Virtual Memory Swap RAM Memory Cache and Buffer
0 bytes
7Disk Wiping Mechanical Drives
0 bytes
8Disk Wiping Solid State Drives (SSD)
0 bytes
9Scrubbing EXIF & Metadata Part1 Introduction
0 bytes
10Scrubbing EXIF & Metadata Part2 Tools
0 bytes
11Scrubbing EXIF & Metadata Part3 Guidance
0 bytes
12Sensor Noise Camera Identification
0 bytes
Email Security, Privacy and Anonymity
17 بخش
1Goals and Learning Objectives
0 bytes
2Clients Protocols and Authentication
0 bytes
3Email Weaknesses
0 bytes
4PGPGPG & Privacy
0 bytes
5PGP & GPG Clients
0 bytes
6Windows PGP& GPG
0 bytes
7Tail PGP & GPG
0 bytes
8PGP & GPG Weaknesses
0 bytes
9Improving Open PGP Security Best Practices Part1
0 bytes
10Improving Open PGP Security Primary and Subkeys Part2
0 bytes
11Improving Open PGP Security Smartcards Yubikey Part3
0 bytes
12Email Tracking & Exploits
0 bytes
13Email Anonymity & Pseudonymity
0 bytes
14Tor Birdy
0 bytes
15Remailers
0 bytes
16Choosing an Email Provider
0 bytes
17Email Alternatives
0 bytes
Messengers - Security, Privacy and Anonymity
10 بخش
1Goals and Learning Objectives
0 bytes
2An Introduction to Instant Messengers
0 bytes
3Instant Messenger Signal
0 bytes
4Instant Messengers Chat secure
0 bytes
5Instant Messengers Crypto cat
0 bytes
6Instant Messengers Ricochet
0 bytes
7Instant Messengers Other
0 bytes
8Video and Voice Messengers Lin phone
0 bytes
9Video and Voice Messengers Jitsi
0 bytes
10Video and Voice Messengers Other
0 bytes
Wrap Up
5 بخش
1Congratulations
0 bytes
2Certificate Of Completion for CPEs
0 bytes
3Qubes OS
0 bytes
4Effective Network Isolation
0 bytes
5Socks 5 proxy tunneling
0 bytes
5.00
1 دیدگاه
دیدگاه (1)
برای ثبت دیدگاه , وارد شوید
فهیمه دیمه کار
این دانشجو دوره
را پیشنهاد میکند
پاسخ
ممنون ازتون :) برای ارتباط با مشاورین با چه شماره ای باید تماس بگیرم ؟
15/01/1403 | 12:49