The classical answer: It depends on your risk tolerance and the kind of threats you expect to face.
To say "You're better off without one" is a very absolute statement by itself. Perhaps in the scenario of a personal endpoint there is no reason to run another AV other than Windows Defender assuming you keep your OS updated with the latest patches, you don't run any outdated software (Drive-by exploits are a thing...) and you are extremely careful when it comes to downloading things.
But would you say the same if you are in a large organization with more than 5000 endpoints deployed with varying OS and delays in patching? (Always pay attention to patch tuesday!). Having an endpoint solution deployed adds another layer of defense and thus could save you a lot of headaches.
These are the following scenarios that could happen if you have it installed, from best to worst:
- Prevent the execution of malware.
- Detect running malware AND remediate the situation (Kill the running processes, clean up all files generated by malware and quarantine the binary/files with malware)
- Detect running malware AND be unable to remediate the sitaution.
- Not detecting anything.
An endpoint solution can find malware via the following means:
- Checking signatures (Doing static analysis of the binary or checking the MD5 hash against a known database. You can see this for yourself in VirusTotal)
- Checking its behavior at run-time (This is where the hooking DLLs and APIs happens. Perhaps somebody with more knowledge can expand upon this point)
- Sending the file to a sandbox (This can be an installed on-premise appliance or to the vendor's cloud), running it there and receiving an evaluation of what happened.
If you expect to face zero-day threats, the only way to get the best scenario (That is: Prevent malware execution) is with a sandbox by definition as the other 2 methods will not prevent it from executing given the fact that no one has knowledge about it.
But endpoint solutions not only do this! They can also actually reduce the attack surface (I am directly contradicting your professor here) via different means:
- Applying URL filtering so you can limit which websites users can visit.
- Having an application blacklist. Want to run NMAP or Tor browser? Sorry my friend...you can't.
- Limiting the kind of files you can download via a web browser
Finally, if you need more information about their performance or some sort of tool to compare solutions: The MITRE foundation runs tests to see how different solutions react (Regarding detection) to certain scenarios. You can find out more about them and see the results of the 2021 test HERE.
If some day you are in charge of protecting endpoints: Remember to always run proof of concepts and test the solutions under different scenarios to see if they actually do what they promise.