1 00:00:10,540 --> 00:00:16,270 To better your abilities to understand computer threats and how to protect against them you need to 2 00:00:16,270 --> 00:00:20,310 understand how a computer's operating system works. 3 00:00:20,440 --> 00:00:28,650 In this section we're going to learn about Microsoft Windows and Linux operating system. 4 00:00:28,820 --> 00:00:35,040 The most well known and used computer operating system is Windows. 5 00:00:35,120 --> 00:00:40,970 I'm assuming that all of you have used a Windows operating system at one point or another but just in 6 00:00:40,970 --> 00:00:42,750 case you're not very familiar with it. 7 00:00:42,920 --> 00:00:48,540 Let's take a tour of some of the programs that you can run on a Windows computer. 8 00:00:48,560 --> 00:00:52,400 Here we are on my Windows 7 laptop. 9 00:00:52,490 --> 00:00:58,430 The easiest way to navigate around the Windows operating system is to go to the Start button and then 10 00:00:58,430 --> 00:01:01,380 search for whatever program you're looking for. 11 00:01:01,670 --> 00:01:07,790 So for example if I just want to find our basic system information for my Windows computer I can type 12 00:01:07,790 --> 00:01:08,510 in system 13 00:01:12,220 --> 00:01:17,360 and then it comes up with any options that have system in the name. 14 00:01:17,410 --> 00:01:24,360 So here I can see what version of Windows I'm running as well as my processor and RAM information. 15 00:01:24,360 --> 00:01:30,910 This can be helpful information if you're investigating a security issue on a Windows computer because 16 00:01:30,910 --> 00:01:36,660 then you'll know what vulnerabilities the computer may have based on its operating system version. 17 00:01:38,410 --> 00:01:46,180 But Windows 7 is going to have different vulnerabilities when compared to Windows 8 or 10. 18 00:01:46,340 --> 00:01:52,340 Of course it's critical to keep your Windows operating systems up to date from the system page on Lost 19 00:01:52,340 --> 00:01:53,350 him pain. 20 00:01:53,360 --> 00:02:00,260 You can go to Windows updates and as you can see I'm a little behind here so I want to make sure to 21 00:02:00,260 --> 00:02:05,690 install these updates to make sure that my computer is protected for any security vulnerabilities out 22 00:02:05,690 --> 00:02:07,180 there. 23 00:02:07,330 --> 00:02:13,100 Other things I like to look at as far as security goes with Windows is the Windows Firewall and Windows 24 00:02:13,100 --> 00:02:15,240 Defender. 25 00:02:15,450 --> 00:02:21,010 Go back to the start menu and just search for firewall. 26 00:02:21,300 --> 00:02:23,170 Click on Windows firewall. 27 00:02:23,570 --> 00:02:26,400 Here I can see if my windows firewall is enabled or not. 28 00:02:26,790 --> 00:02:32,370 As you can see the windows firewall can help prevent hackers or malicious software from gaining access 29 00:02:32,370 --> 00:02:33,970 to your computer. 30 00:02:33,990 --> 00:02:37,250 You definitely want to make sure that your firewall is enabled. 31 00:02:37,350 --> 00:02:43,590 Windows operating systems come with windows the Finder which is an additional layer of security for 32 00:02:43,590 --> 00:02:50,640 your computer that helps to protect against spyware and potentially unwon in software. 33 00:02:50,640 --> 00:02:56,740 So this is another really good basic tool that you can use to help protect your Windows operating system 34 00:02:58,230 --> 00:03:03,420 but so far I've shown you the Windows Firewall and Windows Defender of course in addition to those default 35 00:03:03,420 --> 00:03:09,720 security knocking ism's you're going to have some type of anti-virus or anti-malware installed on your 36 00:03:09,720 --> 00:03:12,170 Windows device that should be a given. 37 00:03:12,180 --> 00:03:18,780 If you don't have anti-virus and anti-malware software running on your Windows computer you will most 38 00:03:18,780 --> 00:03:25,080 definitely get infected and be vulnerable to exploits. 39 00:03:25,080 --> 00:03:32,010 My computer anti-virus is running the system center and point protection from Microsoft. 40 00:03:32,310 --> 00:03:36,690 So is that for real time protection for anti-virus. 41 00:03:36,810 --> 00:03:44,760 And then in addition to that I'm running malware bytes for anti malware and ransomware. 42 00:03:44,760 --> 00:03:51,660 So again back to the defense in-depth concept you want to have multiple layers of security to protect 43 00:03:51,660 --> 00:03:52,570 your endpoints. 44 00:03:55,160 --> 00:04:01,130 One really good basic tool to use when you're working on a Windows computer is the command line prompt. 45 00:04:01,130 --> 00:04:10,910 So if you search for ACMD and launch that this is our command line prompt and you can access files from 46 00:04:10,910 --> 00:04:19,110 here do all sorts of things most of the time when I am accessing the command line prompt. 47 00:04:19,490 --> 00:04:28,520 I'm looking for network information for the Windows device so IP config slash all is a really good command 48 00:04:28,520 --> 00:04:38,060 to run and they'll give me some of my network information like IP address my default gateway DHP server 49 00:04:38,060 --> 00:04:46,280 DNS servers the letter to mac address for my network interface card. 50 00:04:46,430 --> 00:04:54,100 One of my favorite Windows tools to see what's going on with an endpoint is the resource monitor. 51 00:04:54,170 --> 00:05:04,040 So if we go to our start menu and search for resource and then click on resource monitor I can get a 52 00:05:04,040 --> 00:05:11,390 really good look into what programs are running on the device what kind of resources they're using for 53 00:05:11,390 --> 00:05:16,520 CPQ memory desk and even network connections. 54 00:05:16,940 --> 00:05:22,280 So if I have a computer that has some suspicious activity going on I can come in here to the network 55 00:05:22,280 --> 00:05:28,070 tab and see what connections are being made for which addresses and applications.