Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Endpoints
Search
Olakanmi Oluwole
October 21, 2025
12
0
Share
Endpoints
Olakanmi Oluwole
October 21, 2025
More Decks by Olakanmi Oluwole
See All by Olakanmi Oluwole
INTRODUCTION TO ARTIFICIAL INTELLIGENCE FOR CYBER THREAT INTELLIGENCE INVESTIGATION
l4sec
0
39
Creating the managed SOC of tomorrow
l4sec
0
30
Malware Analysis and Reverse Engineering
l4sec
0
73
Kill one, Kill all
l4sec
0
60
DETECTING AND INVESTIGATING FAKE JOB LISTINGS USING OSINT
l4sec
0
76
THE BUSINESS OF SIM SWAPPING OLAKANMI OLUWOLE - Insights from Nigeria, Africa and beyond
l4sec
0
100
GETTING STARTED WITH USING THE DARK WEB FOR OSINT INVESTIGATIONS
l4sec
0
85
Cyber security - The bigger picture
l4sec
0
53
WhoGet OSINT Tool
l4sec
0
270
Featured
See All Featured
How to Get Subject Matter Experts Bought In and Actively Contributing to SEO & PR Initiatives.
livdayseo
0
92
Visualization
eitanlees
150
17k
StorybookのUI Testing Handbookを読んだ
zakiyama
31
6.6k
The Language of Interfaces
destraynor
162
26k
I Don’t Have Time: Getting Over the Fear to Launch Your Podcast
jcasabona
34
2.7k
Mind Mapping
helmedeiros
PRO
1
140
A Tale of Four Properties
chriscoyier
163
24k
The Cult of Friendly URLs
andyhume
79
6.8k
New Earth Scene 8
popppiees
2
2k
Abbi's Birthday
coloredviolet
2
6.2k
No one is an island. Learnings from fostering a developers community.
thoeni
21
3.7k
Build The Right Thing And Hit Your Dates
maggiecrowley
39
3.1k
Transcript
Endpoint & Device Security: From Antivirus to Mobile Protection Antivirus/EDR,
Patch Management, Configuration Hardening, and Mobile Security
Lesson Outcomes • Understand how Antivirus and EDR protect endpoints
• Recognize the importance of patch management & secure configurations • Apply mobile security best practices in corporate environments • Gain hands-on practice with key security tools
What is Endpoint Protection? • Endpoints = laptops, desktops, servers,
mobile devices • Threats: Malware, ransomware, trojans, spyware • Solutions: Antivirus (AV), Anti-malware, EDR
Antivirus vs EDR • Antivirus: Signature-based detection, quarantines known malware
(Example: ClamAV) • EDR: Real-time monitoring, detects unknown/fileless attacks, forensic data & auto-response
Hands-on Demo: ClamAV • Install: sudo apt install clamav •
Update signatures: freshclam • Scan directory: clamscan -r --bell -i /home/user/ • Detects EICAR test file
Practical Tools for Endpoint Analysis • file <filename>: Identify file
type • strings <filename>: Extract readable strings • Detect suspicious API calls, IPs, domains
Activity: Using strings & file • file suspicious.exe • strings
suspicious.exe | less • Look for domains, DLL imports, embedded passwords
Why Patch Management Matters • 60–70% of breaches = unpatched
vulnerabilities • Example: WannaCry (2017) exploited Windows SMB • Patching closes known attack doors
Configuration Hardening • Default settings are insecure • Disable unused
services, enforce least privilege • Strong authentication policies, file integrity monitoring
Hands-on Demo: enum4linux • Command: enum4linux -a 192.168.1.10 • Outputs:
SMB shares, user accounts, password policies, misconfigurations
Patch Management Best Practices • Centralized patching (WSUS, SCCM, Ansible)
• Test before deploying • Automate updates • Maintain asset inventory
Mobile Devices in the Enterprise • Common endpoint for corporate
access • Risks: loss/theft, rogue Wi-Fi, malicious apps • BYOD challenges
Best Practices for Mobile Security • Enforce device encryption •
Use Mobile Device Management (MDM) • Remote wipe capability • Strong PIN/biometric policies • Containerization (work/personal data separation)
Mobile Threat Landscape • Malware in third-party app stores •
Smishing (SMS phishing) • Rogue Wi-Fi access points • Rooted/jailbroken devices
Case Study: Corporate Data Breach • Employee lost unencrypted phone
• Cached corporate emails accessed by attacker • Prevention: MDM + remote wipe
Defense-in-Depth • Antivirus/EDR = detect & respond • Patching &
hardening = reduce attack surface • Mobile security = protect mobile workforce • Layered defense = resilience
Hands-On Recap • file & strings → Basic malware analysis
• ClamAV → Antivirus scanning • enum4linux → Misconfig discovery
Key Takeaways • Antivirus/EDR stop endpoint threats • Patch &
harden systems to prevent exploitation • Mobile devices = corporate endpoints too • Security = continuous process, not one-time
Final Thought • Cybersecurity is not about eliminating all risk—it’s
about managing risk through layered defense and continuous vigilance