Lesson 10
Lesson 10: Endpoint Security
Endpoint Hardening
Operating System Security:
- Apply
CIS BenchmarksorSTIGsto harden Windows, Linux, macOS - Configure secure baseline settings: disable unnecessary services, close ports, restrict interfaces
- Use
least privilege: restrict user and system permissions - Harden file systems, enforce ACLs, monitor with Group Policy or SELinux
Hardening Techniques:
Change Defaults: Remove default credentials and settingsRemove Unnecessary Software: Reduce attack surfaceProtect Physical Ports: Disable unused USBs, restrict console accessFull Disk Encryption (FDE): BitLocker encrypts entire driveRemovable Media Encryption: Protect data on USBs/external storageEmail Encryption: Secure sensitive communicationsHost-Based Firewalls/IPS: Prevent unauthorized accessVPNs: Encrypt traffic from remote devices
Endpoint Protection:
Network Segmentation: Isolate departments or sensitive systemsIsolation: Quarantine compromised endpointsAntivirus/Antimalware: Detect known threatsPatch Management: Fix vulnerabilities proactively
Hardening Specialized Devices:
ICS/SCADA Systems:
- Network segmentation and unidirectional gateways (data diodes)
- Enforce strong authentication
Embedded Systems & RTOS:
- Choose secure hardware/software
- Avoid unnecessary network exposure
Advanced Endpoint Protection
Key Technologies:
EDR (Endpoint Detection and Response): Real-time monitoring/response for endpoint threats, focused on individual endpointsXDR (Extended Detection and Response): Centralized view across endpoints, servers, networks, broader scope than EDRHIDS (Host-Based Intrusion Detection System): Detects threats on specific host (logs, files), passive - alerts onlyHIPS (Host-Based Intrusion Prevention System): Monitors and blocks malicious behavior on host, active - blocks threatsUEBA (User & Entity Behavior Analytics): Detects anomalies in user/system behavior, good for insider threats
Mobile Security
Deployment Models:
BYOD (Bring Your Own Device): User owns device, high flexibility, high riskCOPE (Corporate-Owned, Personally Enabled): Company-owned with personal use allowed, balance of controlCOBO (Corporate-Owned, Business Only): Strict company-only use, high securityCYOD (Choose Your Own Device): User selects from pre-approved device list, mix of control/customization
Mobile Device Hardening:
Full Device Encryption: Protects stored data (iOS auto-enables with passcode)External Media Encryption: Encrypt removable storage (USB, SD cards)Geofencing: Trigger security actions based on location (disable camera in secure areas)Restrict Sensors/Connections: Limit camera, screen capture, Bluetooth, NFC, GPS, tethering, hotspot
Mobile Device Management (MDM):
Enforce security policies, app controls, remote wipe Tools: Intune, JAMF
Connection & Location Controls:
Wi-Fi: Use secure enterprise networks, avoid public/rogue networks (evil twins)Cellular/GPS: Manage device tracking and data usePANs (Personal Area Networks): Bluetooth, wearables - restrict if not requiredNFC & Mobile Payments: Secure short-range communication, disable if not neededVPNs: Encrypt mobile traffic
All Content
Lesson 0: Study Tips and Resources
Study Tips and Resources
Lesson 1: Fundamental Security Concepts
Study Tips and Resources
Lesson 2: Threat Types
Study Tips and Resources
Lesson 3: Cryptographic Solutions
Study Tips and Resources
Lesson 4: Identity and Access Management (IAM)
Study Tips and Resources
Lesson 5: Enterprise Network Architecture
Study Tips and Resources
Lesson 6: Cloud & Zero Trust
Study Tips and Resources
esson 7: Resiliency and Site Security
Study Tips and Resources
Lesson 8: Vulnerability Management
Study Tips and Resources
Lesson 9: Network Security Capabilities
Study Tips and Resources
Lesson 11: Application Security
Study Tips and Resources
Lesson 12: Alerting and Monitoring
Study Tips and Resources
Lesson 13: Analyze Indicators of Malicious Activity
Study Tips and Resources
Lesson 14: Security Governance Concepts
Study Tips and Resources
Lesson 15: Risk Management Processes
Study Tips and Resources
Lesson 16: Data Protection and Compliance Concepts
Study Tips and Resources