Upgrade to PRO for Only $50/Year—Limited-Time Offer! 🔥
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Endpoints
Search
Olakanmi Oluwole
October 21, 2025
0
6
Endpoints
Olakanmi Oluwole
October 21, 2025
Tweet
Share
More Decks by Olakanmi Oluwole
See All by Olakanmi Oluwole
INTRODUCTION TO ARTIFICIAL INTELLIGENCE FOR CYBER THREAT INTELLIGENCE INVESTIGATION
l4sec
0
38
Creating the managed SOC of tomorrow
l4sec
0
28
Malware Analysis and Reverse Engineering
l4sec
0
72
Kill one, Kill all
l4sec
0
58
DETECTING AND INVESTIGATING FAKE JOB LISTINGS USING OSINT
l4sec
0
73
THE BUSINESS OF SIM SWAPPING OLAKANMI OLUWOLE - Insights from Nigeria, Africa and beyond
l4sec
0
98
GETTING STARTED WITH USING THE DARK WEB FOR OSINT INVESTIGATIONS
l4sec
0
81
Cyber security - The bigger picture
l4sec
0
52
WhoGet OSINT Tool
l4sec
0
230
Featured
See All Featured
Intergalactic Javascript Robots from Outer Space
tanoku
273
27k
Designing Dashboards & Data Visualisations in Web Apps
destraynor
231
54k
Code Review Best Practice
trishagee
74
19k
How to train your dragon (web standard)
notwaldorf
97
6.4k
The Hidden Cost of Media on the Web [PixelPalooza 2025]
tammyeverts
1
97
A Modern Web Designer's Workflow
chriscoyier
698
190k
What’s in a name? Adding method to the madness
productmarketing
PRO
24
3.8k
Optimising Largest Contentful Paint
csswizardry
37
3.5k
CoffeeScript is Beautiful & I Never Want to Write Plain JavaScript Again
sstephenson
162
16k
Bash Introduction
62gerente
615
210k
The Art of Delivering Value - GDevCon NA Keynote
reverentgeek
16
1.8k
The Power of CSS Pseudo Elements
geoffreycrofte
80
6.1k
Transcript
Endpoint & Device Security: From Antivirus to Mobile Protection Antivirus/EDR,
Patch Management, Configuration Hardening, and Mobile Security
Lesson Outcomes • Understand how Antivirus and EDR protect endpoints
• Recognize the importance of patch management & secure configurations • Apply mobile security best practices in corporate environments • Gain hands-on practice with key security tools
What is Endpoint Protection? • Endpoints = laptops, desktops, servers,
mobile devices • Threats: Malware, ransomware, trojans, spyware • Solutions: Antivirus (AV), Anti-malware, EDR
Antivirus vs EDR • Antivirus: Signature-based detection, quarantines known malware
(Example: ClamAV) • EDR: Real-time monitoring, detects unknown/fileless attacks, forensic data & auto-response
Hands-on Demo: ClamAV • Install: sudo apt install clamav •
Update signatures: freshclam • Scan directory: clamscan -r --bell -i /home/user/ • Detects EICAR test file
Practical Tools for Endpoint Analysis • file <filename>: Identify file
type • strings <filename>: Extract readable strings • Detect suspicious API calls, IPs, domains
Activity: Using strings & file • file suspicious.exe • strings
suspicious.exe | less • Look for domains, DLL imports, embedded passwords
Why Patch Management Matters • 60–70% of breaches = unpatched
vulnerabilities • Example: WannaCry (2017) exploited Windows SMB • Patching closes known attack doors
Configuration Hardening • Default settings are insecure • Disable unused
services, enforce least privilege • Strong authentication policies, file integrity monitoring
Hands-on Demo: enum4linux • Command: enum4linux -a 192.168.1.10 • Outputs:
SMB shares, user accounts, password policies, misconfigurations
Patch Management Best Practices • Centralized patching (WSUS, SCCM, Ansible)
• Test before deploying • Automate updates • Maintain asset inventory
Mobile Devices in the Enterprise • Common endpoint for corporate
access • Risks: loss/theft, rogue Wi-Fi, malicious apps • BYOD challenges
Best Practices for Mobile Security • Enforce device encryption •
Use Mobile Device Management (MDM) • Remote wipe capability • Strong PIN/biometric policies • Containerization (work/personal data separation)
Mobile Threat Landscape • Malware in third-party app stores •
Smishing (SMS phishing) • Rogue Wi-Fi access points • Rooted/jailbroken devices
Case Study: Corporate Data Breach • Employee lost unencrypted phone
• Cached corporate emails accessed by attacker • Prevention: MDM + remote wipe
Defense-in-Depth • Antivirus/EDR = detect & respond • Patching &
hardening = reduce attack surface • Mobile security = protect mobile workforce • Layered defense = resilience
Hands-On Recap • file & strings → Basic malware analysis
• ClamAV → Antivirus scanning • enum4linux → Misconfig discovery
Key Takeaways • Antivirus/EDR stop endpoint threats • Patch &
harden systems to prevent exploitation • Mobile devices = corporate endpoints too • Security = continuous process, not one-time
Final Thought • Cybersecurity is not about eliminating all risk—it’s
about managing risk through layered defense and continuous vigilance