UDEMY
UDEMY Logo

The Complete Cyber Security Course : End Point Protection 

  • Offered byUDEMY

The Complete Cyber Security Course : End Point Protection
 at 
UDEMY 
Overview

Duration

2 hours

Mode of learning

Online

Difficulty level

Intermediate

Credential

Certificate

The Complete Cyber Security Course : End Point Protection
 at 
UDEMY 
Highlights

  • Earn a Certificate of completion from Udemy on successful course completion
  • Earn a certificate upon successful completion
  • Gain Lifetime Access to Courseware
Details Icon

The Complete Cyber Security Course : End Point Protection
 at 
UDEMY 
Course details

Who should do this course?
  • This course is for anyone who wants to become an expert in security, privacy, and anonymity.
  • The ideal student for this course is technically minded with an interest in how hackers hacker, how trackers track and what you can do to stop them.
  • For those who want privacy and anonymity online from hackers, corporations and governments.
  • For those interesting in the latest trends in cyber security and protection of end-points.
What are the course deliverables?
  • You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
  • We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
  • How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
  • How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
  • How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
  • We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
  • We end by looking the extremely important topic of email and messenger security.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
Read more
More about this course
  • Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks. Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully. Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.

The Complete Cyber Security Course : End Point Protection
 at 
UDEMY 
Curriculum

Introduction

Goals and Learning Objectives

File and Disk Encryption

Anti-Virus and End-Point-Protection

Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)

End-Point-Protection Technology

Threat Detection and Monitoring

Malware and Hacker Hunting on the End-Point

Operating System and Application Hardening

Secure Deleting, Evidence Elimination and Anti-Forensics

Email Security, Privacy and Anonymity

Messengers - Security, Privacy and Anonymity

Wrap Up

BONUS Section

Other courses offered by UDEMY

549
50 hours
– / –
3 K
10 hours
– / –
549
4 hours
– / –
599
10 hours
– / –
View Other 2344 CoursesRight Arrow Icon
qna

The Complete Cyber Security Course : End Point Protection
 at 
UDEMY 

Student Forum

chatAnything you would want to ask experts?
Write here...