End-User Security: Securing End Users against Attackers

placeholder

This 10-video course examines end-user security from the rogue attacker point of view including motivations Malware-as-a-Service (MaaS) phishing techniques pharming ransomware data theft cryptojacking denial-of-service (DoS) and toolkits. One of the first things to do to be successful as a security technician or practitioner is to start to understand the mind of the attacker so you will examine the possible motives for attacking user endpoints. You will then take a look at Malware-as-a-Service which is available all over the world. You will explore the phishing techniques an attacker might take as they are becoming stealthier sending phishing e-mails over varied infrastructures. Delve into ransomware this time from the attackers perspective and learn about data breaches and theft. You will also examine cryptojacking what it is and explore some examples and have a look at DoS and distributed-denial-of-service (DdoS) attacks using for example botnets. The final tutorial surveys common exploit kits such as Kali Linux and Metasploit. The concluding exercise entails listing common motives for attacking endpoints common ransomware payloads and exploit kits.