Summary
During the course of this chapter, you have learned about various endpoint security technologies that work together to prevent malware and other potential threats from compromising a host device on a network. Furthermore, you have discovered various components and tools within the Windows and Linux operating systems. These components will prove useful to you as a security professional when performing an investigation on a host device. Furthermore, you have gained the skills to use the built-in tools within Windows and Linux to assist in identifying suspicious activities on a system by observing the processes and system performance. Lastly, you have also learned how to find and view the system, application, and security logs on an endpoint. Logs are very important as they provide timestamps and a description of events on a host device.
I hope this chapter has been informative for you and is helpful in your journey toward learning the foundations of cybersecurity operations...