Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Endpoints
Search
Olakanmi Oluwole
October 21, 2025
0
10
Endpoints
Olakanmi Oluwole
October 21, 2025
Tweet
Share
More Decks by Olakanmi Oluwole
See All by Olakanmi Oluwole
INTRODUCTION TO ARTIFICIAL INTELLIGENCE FOR CYBER THREAT INTELLIGENCE INVESTIGATION
l4sec
0
38
Creating the managed SOC of tomorrow
l4sec
0
28
Malware Analysis and Reverse Engineering
l4sec
0
72
Kill one, Kill all
l4sec
0
58
DETECTING AND INVESTIGATING FAKE JOB LISTINGS USING OSINT
l4sec
0
74
THE BUSINESS OF SIM SWAPPING OLAKANMI OLUWOLE - Insights from Nigeria, Africa and beyond
l4sec
0
100
GETTING STARTED WITH USING THE DARK WEB FOR OSINT INVESTIGATIONS
l4sec
0
82
Cyber security - The bigger picture
l4sec
0
52
WhoGet OSINT Tool
l4sec
0
250
Featured
See All Featured
The SEO Collaboration Effect
kristinabergwall1
0
350
Design of three-dimensional binary manipulators for pick-and-place task avoiding obstacles (IECON2024)
konakalab
0
350
The Mindset for Success: Future Career Progression
greggifford
PRO
0
230
Reality Check: Gamification 10 Years Later
codingconduct
0
2k
A better future with KSS
kneath
240
18k
JavaScript: Past, Present, and Future - NDC Porto 2020
reverentgeek
52
5.8k
Art, The Web, and Tiny UX
lynnandtonic
304
21k
How to train your dragon (web standard)
notwaldorf
97
6.5k
Being A Developer After 40
akosma
91
590k
Stop Working from a Prison Cell
hatefulcrawdad
273
21k
Lessons Learnt from Crawling 1000+ Websites
charlesmeaden
PRO
1
1.1k
Hiding What from Whom? A Critical Review of the History of Programming languages for Music
tomoyanonymous
2
410
Transcript
Endpoint & Device Security: From Antivirus to Mobile Protection Antivirus/EDR,
Patch Management, Configuration Hardening, and Mobile Security
Lesson Outcomes • Understand how Antivirus and EDR protect endpoints
• Recognize the importance of patch management & secure configurations • Apply mobile security best practices in corporate environments • Gain hands-on practice with key security tools
What is Endpoint Protection? • Endpoints = laptops, desktops, servers,
mobile devices • Threats: Malware, ransomware, trojans, spyware • Solutions: Antivirus (AV), Anti-malware, EDR
Antivirus vs EDR • Antivirus: Signature-based detection, quarantines known malware
(Example: ClamAV) • EDR: Real-time monitoring, detects unknown/fileless attacks, forensic data & auto-response
Hands-on Demo: ClamAV • Install: sudo apt install clamav •
Update signatures: freshclam • Scan directory: clamscan -r --bell -i /home/user/ • Detects EICAR test file
Practical Tools for Endpoint Analysis • file <filename>: Identify file
type • strings <filename>: Extract readable strings • Detect suspicious API calls, IPs, domains
Activity: Using strings & file • file suspicious.exe • strings
suspicious.exe | less • Look for domains, DLL imports, embedded passwords
Why Patch Management Matters • 60–70% of breaches = unpatched
vulnerabilities • Example: WannaCry (2017) exploited Windows SMB • Patching closes known attack doors
Configuration Hardening • Default settings are insecure • Disable unused
services, enforce least privilege • Strong authentication policies, file integrity monitoring
Hands-on Demo: enum4linux • Command: enum4linux -a 192.168.1.10 • Outputs:
SMB shares, user accounts, password policies, misconfigurations
Patch Management Best Practices • Centralized patching (WSUS, SCCM, Ansible)
• Test before deploying • Automate updates • Maintain asset inventory
Mobile Devices in the Enterprise • Common endpoint for corporate
access • Risks: loss/theft, rogue Wi-Fi, malicious apps • BYOD challenges
Best Practices for Mobile Security • Enforce device encryption •
Use Mobile Device Management (MDM) • Remote wipe capability • Strong PIN/biometric policies • Containerization (work/personal data separation)
Mobile Threat Landscape • Malware in third-party app stores •
Smishing (SMS phishing) • Rogue Wi-Fi access points • Rooted/jailbroken devices
Case Study: Corporate Data Breach • Employee lost unencrypted phone
• Cached corporate emails accessed by attacker • Prevention: MDM + remote wipe
Defense-in-Depth • Antivirus/EDR = detect & respond • Patching &
hardening = reduce attack surface • Mobile security = protect mobile workforce • Layered defense = resilience
Hands-On Recap • file & strings → Basic malware analysis
• ClamAV → Antivirus scanning • enum4linux → Misconfig discovery
Key Takeaways • Antivirus/EDR stop endpoint threats • Patch &
harden systems to prevent exploitation • Mobile devices = corporate endpoints too • Security = continuous process, not one-time
Final Thought • Cybersecurity is not about eliminating all risk—it’s
about managing risk through layered defense and continuous vigilance