End Point Protection
Section 3: File & Disk Encryption
- Disk Encryption Attacks
- Cryptoalgorithms, Brute Force Attacks & Implementation
- Physical
- Containers, Volumes and Partitions
- Windows - Disk Encryption
- Introduction
- BitLocker
- VeraCrypt
- Setting up VeraCrypt (Windows, Mac & Linux)
- CipherShed, Diskcryptor, Symantec & Bestcrypt
- Linux
- Linux Whole Disk Encryption - Dm-crypt and LUKS
- Setting up Dm-crypt / LUKS
- Encrypting the boot partition with Grub2
- Self Encrypting Drives (SEDs)
- Defense against Disk Decryption Attacks
- File Encryption
- Mandatory Key Disclosure & Plausible Deniability
- Case Studies in Disk Decryption
Section 4: Anti-Virus & End-Point-Protection
- Is Anti-Virus dead?
- The Threat Landscape
- Protection Methods
- Ransomware
- Anti-Virus & End-Point-Protection Testing
- The Best of Business End-Point-Protection (EPP)
- Windows - The Best of Anti-Virus & End-Point-Protection
- Business End-Point-Protection (EPP)
- Linux - The Best of Anti-Virus & End-Point-Protection
- Online & Second Opinion - Anti-Virus & End-Point-Protection
- Is Anti-Virus & End-Point-Protection Dangerous?
Section 6: End-Point-Protection Technology
- What is application & execution control?
- Windows - Application control
- ACLs, Windows Permission Identifier & Accessenum
- User Account Control (UAC)
- Software Restriction Policies
- AppLocker
- Parental controls
- Windows - Third Party App Control - AV, Appguard, VoodooShield, NoVirusThanks
- Windows - Exploitation Prevention
- Windows 10 - Device Guard
- Windows - Defender Application Guard for Micorsoft Edge
- Linux - Security frameworks
- AppArmor
- SELinux (Security-Enhanced Linux)
- Grsecurity
- PaX and more
- The New Normal for End-Point-Protection Technology
Section 7: Threat Detection & Monitoring
- Honeypots (Ideal for home users)
- Rethinking Honeypots
- Canary Tokens
- OpenCanary
- Artillery - Binary Defense
- Honey Drive
- Intrusion Detection Systems (IDS) - Snort, Suricata, Bro IDS & OpenWIP-n
- Host-Based Intrusion Detection - OSSEC
- Network Analysis - Sguil, Xplico & NetworkMiner
- File Integrity Monitoring (FIM) and Checking
- Network Security Toolkit (NST)
- Security Onion
- Security Information & Event Management System (SIEM)
Section 8: Malware & Hacking Hunting on the End-Point
- Introduction to Malware & Hacker Hunting
- Windows - Farbar Recovery Scanner
- Automated Malware Removal Tools
- Live Rescue Operating Systems, CDs and USBs
- Windows - Malware Seek & Destroy
- Process Explorer (recommended; advanced task manager)
- Process Tools
- Sigcheck (scan for unsigned files)
- Autoruns (shows you what programs are configured to run during system bootup or login; can be used to run on offline systems)
- Process Monitor
- Network Connections
- Networx (bandwidth monitor, connection speed test, data usage log)
- Linux - Malware Seek & Destroy
- Sysdig
- Csysdig
- debsums & unhide
- rkhunter
- Chkrootkit, Tiger, Clamav & Linux Malware Detect(LMD)
- Persistence
- Mac, Linux & Windows - OSquery
- Firmware Rootkits - Seek & Destroy
- Reference Materials
- Firmware Extraction Tools (make sure you remove private information such as wifi password before upload to virustotal
- End-Point-Protection Recovery & Remediation Technology (Disk Cloning/ Re-imaging/ Roll Back)
- Encrypted Backup & Cloud Storage
- Add client side encryption to Dropbox, Google Drive (20+ providers)
- Local / On-premises Backup
- Encrypted Cloud Storage
- File Syncing
- Self Hosting Encrypted Cloud Storage
Section 9: Operating System & Application Hardening
- Hardening Standards
- OpenSCAP (multi platforms)
- Baseline Auditing
- Windows - Hardening
- Windows - Security Compliance Manager (SCM)
- Linux - Hardening
- Security Focused Operating Systems
Section 10: Secure Deleting, Evidence Elimination and Anti-Forensics
- Secure File Deletion
- Mechanical Drives
- Solid State Drives (SSD)
- Evidence Elimination
- CCleaner & Bleachit
- Virutal Memory, Swap, RAM Memory Cache and Buffer
- Disk Wiping (Sanitization)
- Mechanical Drives
- Solid State Drives (SSD)
- Scrubbing EXIF & Metadata
- Introduction
- Tools
- Guidance
- Sensor Noise Camera Identification
Section 11: Email Security, Privacy & Anonymity
- Clients, Protocols and Authentication
- Email Weaknesses
- PGP, GPG & Privacy
- PGP & GPG Clients
- PGP & GPG Weaknesses
- Improving OpenPGP Security
- Best Practices
- Primary & Subkeys
- Smartcards / YubiKey
- Email Tracking & Exploits
- Email Anonymity & Pseudonymity
- TorBirdy (extension for Thunderbird to make connection over the Tor network)
- Remailers
- Choosing an Email Provider
- Email Alternatives (other than messengers)
Section 12: Messengers - Security, Privacy & Anonymity
- Introduction
- Instant Messenger
- Signal
- ChatSecure
- Cryptocat
- Ricochet
- Other
- Video & Voice Messengers