The Complete Cyber Security Course : End Point Protection!
Volume 4 :Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware
4.68 (6614 reviews)

98 788
students
16.5 hours
content
Mar 2024
last update
$159.99
regular price
What you will learn
An advanced practical skill-set in securing laptops, desktops and mobile devices.
Start a career in cyber security. Become a cyber security specialist.
The very latest up-to-date information and methods.
You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
We end by looking the extremely important topic of email and messenger security.
A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
Course Gallery




Charts
Students
Price
Rating & Reviews
Enrollment Distribution
Comidoc Review
Our Verdict
The Complete Cyber Security Course: End Point Protection offers a solid foundation in cybersecurity fundamentals while acknowledging its need for updated content in certain areas. Its thorough exploration of various endpoint protection technologies and techniques still provides value, even if the course could better address contemporary security concerns. A certificate of completion signed by Nathan House adds credibility to this engaging training resource.
What We Liked
- Despite some outdated content, this course still provides relevant techniques and methods for cybersecurity specialization, particularly in endpoint protection.
- The course offers a comprehensive exploration of diverse technologies used in end-point protection software, from traditional to next-generation approaches.
- Participants will learn how to detect and monitor threats like malware and hackers using security deception and detection technologies.
- Instructor Nathan House delivers valuable insights on operating system hardening, anti-forensics, and email and messenger security.
Potential Drawbacks
- The course would benefit from updating certain modules to include information about more recent security technologies, such as Microsoft Teams, Microsoft 365, Microsoft Edge, Google Chrome, and Windows 11.
- A few resources mentioned in the course are outdated or no longer available, which might hinder the learning experience for some students.
- Some sections may feel drawn out due to excessive emphasis on older technologies like Firefox and Thunderbird, which may not be applicable to all organizational environments.
Related Topics
872460
udemy ID
08/06/2016
course created date
21/11/2019
course indexed date
Bot
course submited by