First of all, I have to apologise for the lack of posts the previous few months. After being put on furlough in April I was made redundant in July so when I wasn’t home-schooling the kids with the wife I was searching for jobs bit I am pleased to say I HAVE ONE and started on Monday. Loving it so far and there is a possibility I can be exposed to some blue team security stuff through it so I am over the moon and proper happy.
So here we are with the FINAL part in the four-part course given by Nathan House, the previous ones were: –
- VOLUME 1: HACKER’S EXPOSED
- VOLUME 2: NETWORK SECURITY
- VOLUME 3: ANONYMOUS BROWSING
- VOLUME 4: ENDPOINT PROTECTION
And here is the links to the posts on them.
“Description
Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.
On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now!
Become a cyber-security specialist – Go from a beginner to advanced in this easy to follow expert course.
Covering all the major platforms Windows, MacOS, Linux, iOS and Android.
Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks.
Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully.
Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.
Learn how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker hunting!
Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
Explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
Plus, there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.
This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity. “
Volume 4 is the perfect way to end the course for me given I want to get into blue team stuff and we learn a lot about this.
In section one we have the introduction where Nathan talks about the course, its target audience and tells us a bit about himself.
Section two is we have the learning objective so what is endpoint and why is it important.
Here in section three is where we get into the guts of volume four getting into disk encryption, bitlocker and more for windows but also MacOS Filevault, Linux DMCrypt/LUKS and loads more.
In section four is a fascinating 14 lectures over an hour about anti-virus on different operating systems. Is anti-virus dead? And anti-virus and end-point-protection dangerous?
Section five it’s a talk about next generation anti-virus (NG-AV) & end-point-protection (NG-EPP).
Now in section six there is a whopping twenty-six lectures over two hours on things like UAC (user account controls), restriction policies, third party app control, access control models in Linux and loads more.
In section seven we speak about threat detection and monitoring which I find fascinating given I use ‘Windows Defender Advanced Threat Protection (ATP)’ in my new job.
Section eight is the daddy of sections with thirty lectures on malware and hacker hunting on end point, the details that Nathan goes into is excellent and easy to follow.
Here in section nine it’s about operating system and application hardening.
In section ten we discuss secure deleting, evidence elimination and anti-forensics so talking drives, CCleaner, scrubbing EXIF and metadata.
Section eleven is email security, privacy and anonymity, PGP, GPG.
Now in section twelve is messenger and this was interesting to me as I recently deleted my Facebook, Facebook Messenger, WhatsApp and a few more social medias.
In section thirteen we have the wrap up and a bit about Qubes.
We finish in the last section with a bonus on ‘How to Start a Careen in Cyber Security’.
If you follow me on twitter you will know how much I like Nathan teaching (I have taken some terrible courses), but these are a great series of courses. They’re well prepared, well presented. He has a very deep knowledge and experience in the subject.
Go to the website and have a look at the courses, they are fantastic value for money.
Check them out at the following:-
- Station X website = https://www.stationx.net/
- Station X Facebook = https://www.facebook.com/gotostationx/
- Station X Twitter = https://twitter.com/gotostationx/
- Station X LinkedIn = https://www.linkedin.com/company/stationx/
- Station X YouTube = https://www.youtube.com/channel/UC-vWmE-BHcUrYW5zwDijL1g/videos
- Nathan Twitter = https://twitter.com/GotoNathan