Section 1 : Introduction
|
Lecture 1 | Introduction | 00:10:42 Duration |
|
Lecture 2 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 3 | About Proctor Testing | |
|
Lecture 4 | Wireshark Installation Windows | 00:05:51 Duration |
|
Lecture 5 | Wireshark Installation Mac OS | 00:03:06 Duration |
Section 2 : Wireshark Basics
|
Lecture 1 | The best way to learn! | 00:02:09 Duration |
|
Lecture 2 | Capture frames packets segments | 00:15:11 Duration |
|
Lecture 3 | Why are no packets captured | 00:09:30 Duration |
|
Lecture 4 | Port SPAN Mirroring | 00:05:45 Duration |
Section 3 : OSI Model
Section 4 : Wireshark Filters
|
Lecture 1 | Wireshark Display filters | 00:02:45 Duration |
|
Lecture 2 | Practical Demonstration of Wireshark Display filters | 00:10:49 Duration |
|
Lecture 3 | Two types of filters | 00:01:35 Duration |
|
Lecture 4 | Wireshark Capture Filters | 00:04:52 Duration |
|
Lecture 5 | Wireshark Filters IP address protocols | 00:08:27 Duration |
Section 5 : Wireshark Hacking Passwords
|
Lecture 1 | Telnet Password & Data Captures | 00:09:00 Duration |
|
Lecture 2 | TFTP Password & Data Capture | 00:03:06 Duration |
|
Lecture 3 | FTP Password & Data Capture | 00:01:38 Duration |
|
Lecture 4 | HTTP Data Capture | 00:04:58 Duration |
|
Lecture 5 | Cisco router HTTP Password Capture | 00:07:50 Duration |
Section 6 : Hacking VoIP
|
Lecture 1 | Replay Voice over IP calls (Virtual IP Phones) | 00:15:57 Duration |
|
Lecture 2 | Capture and replay voice calls (Virtual & Physical IP Phones) | 00:06:47 Duration |
Section 7 : Protocol Analysis Can you troubleshoot the network
|
Lecture 1 | DTP Lab Quiz | 00:00:52 Duration |
|
Lecture 2 | DTP Lab Answers | 00:08:57 Duration |
|
Lecture 3 | CDP, LLDP Lab Quiz | 00:01:57 Duration |
|
Lecture 4 | CDP, LLDP Lab Answers | 00:08:33 Duration |
|
Lecture 5 | OSPF Lab Quiz | 00:02:36 Duration |
|
Lecture 6 | OSPF Lab Answers Part 1 | 00:14:08 Duration |
|
Lecture 7 | OSPF Lab Answers Part 2 | 00:02:05 Duration |
|
Lecture 8 | OSPF Troubleshooting Lab 1 Question | 00:01:53 Duration |
|
Lecture 9 | OSPF Troubleshooting Lab 1 Answers | 00:11:28 Duration |
|
Lecture 10 | OSPF Troubleshooting Lab 2 Question | 00:01:44 Duration |
|
Lecture 11 | OSPF Troubleshooting Lab 2 Answers | 00:05:31 Duration |
|
Lecture 12 | OSPF Troubleshooting Lab 3 Question | 00:01:25 Duration |
|
Lecture 13 | OSPF Troubleshooting Lab 3 Answers | |
|
Lecture 14 | EIGRP Lab Questions | 00:01:23 Duration |
|
Lecture 15 | EIGRP Lab Answers | 00:08:08 Duration |
|
Lecture 16 | EIGRP Troubleshooting Lab 1 Question | 00:01:15 Duration |
|
Lecture 17 | EIGRP Troubleshooting Lab 1 Answers | 00:05:10 Duration |
|
Lecture 18 | EIGRP Troubleshooting Lab 2 Question | 00:00:59 Duration |
|
Lecture 19 | EIGRP Troubleshooting Lab 2 Answers | 00:03:10 Duration |
|
Lecture 20 | BGP Lab Question | 00:01:20 Duration |
|
Lecture 21 | BGP Lab Answers | 00:11:09 Duration |
|
Lecture 22 | BGP Troubleshooting Lab Question | 00:01:04 Duration |
|
Lecture 23 | BGP Troubleshooting Lab Answers | 00:07:16 Duration |
Section 8 : Wireshark Tips and Tricks
|
Lecture 1 | Quick Wireshark Filters | 00:04:00 Duration |
|
Lecture 2 | Wireshark Profiles | 00:07:44 Duration |
|
Lecture 3 | Wireshark Conversation Filters | 00:01:42 Duration |
|
Lecture 4 | Wireshark Statistics | 00:05:14 Duration |
|
Lecture 5 | Wireshark Protocol Hierarchy | 00:05:48 Duration |
|
Lecture 6 | Wireshark Conversations and IO Graph | 00:05:29 Duration |
|
Lecture 7 | Wireshark Flow Graph | 00:04:48 Duration |
Section 9 : tshark and Termshark
|
Lecture 1 | Overview and tshark install and packet capture | 00:05:50 Duration |
|
Lecture 2 | Termshark | 00:05:56 Duration |
Section 10 : Python Wireshark scripting
|
Lecture 1 | tshark and Pyshark installation | 00:05:10 Duration |
|
Lecture 2 | Basic Pyshark testing | 00:09:26 Duration |
|
Lecture 3 | Pyshark script |
Section 11 : Python Wireshark Password Captures
|
Lecture 1 | Lab overview and setup | 00:06:40 Duration |
|
Lecture 2 | iPython and interactive OSPF script | 00:06:11 Duration |
|
Lecture 3 | OSPF Password Python script | 00:06:34 Duration |
|
Lecture 4 | FTP Password Capture Python script | 00:05:04 Duration |
|
Lecture 5 | Telnet Password Capture Python Script | 00:05:18 Duration |
Section 12 : Kali Linux Installation
|
Lecture 1 | Import Kali Linux (Windows 10 VirtualBox) |
Section 13 : Kali Linux Network Attack Demonstrations
|
Lecture 1 | Network Overview | 00:03:49 Duration |
|
Lecture 2 | DTP Attack Demo | 00:04:21 Duration |
|
Lecture 3 | VTP Attack Demo Part 1 | 00:05:22 Duration |
|
Lecture 4 | VTP Attack Demo Part 2 | 00:09:04 Duration |
|
Lecture 5 | Spanning Tree Attack Demo | 00:02:18 Duration |
|
Lecture 6 | About Proctor Testing |
Section 14 : Kali Linux DHCP attacks and Man-in-the-middle attack
|
Lecture 1 | Overview of lab | 00:04:15 Duration |
|
Lecture 2 | DHCP Starvation attack | 00:03:48 Duration |
|
Lecture 3 | Rogue DHCP Server; MITM attack, Wireshark | 00:06:55 Duration |
Section 15 : Wireshark Quiz Questions
Section 16 : VTP Theory and demonstrations
|
Lecture 1 | Make a choice | |
|
Lecture 2 | VTP Overview | 00:05:27 Duration |
|
Lecture 3 | VTP Overview Part 2 | 00:05:17 Duration |
|
Lecture 4 | VTP Modes | 00:06:13 Duration |
|
Lecture 5 | VTP Versions | 00:01:22 Duration |
|
Lecture 6 | VTP on real 3750 switch | 00:06:05 Duration |
|
Lecture 7 | VTP - Demo Erase switch config | |
|
Lecture 8 | VTP Pruning | 00:04:29 Duration |
|
Lecture 9 | VTP Defaults | 00:00:46 Duration |
|
Lecture 10 | VTP Warnings! | 00:02:00 Duration |
|
Lecture 11 | VTP Demo Overview & Switch 1 config | 00:06:43 Duration |
|
Lecture 12 | VTP Demo Autonegotiation S2 | 00:04:45 Duration |
|
Lecture 13 | VTP Demo VTP Client | 00:06:51 Duration |
|
Lecture 14 | VTP Demo Client overrides server | 00:08:42 Duration |
|
Lecture 15 | VTP Network Meltdown! VLANs removed from database! | 00:08:29 Duration |
|
Lecture 16 | VTP Demo Network Back Again and Transparent Mode | 00:02:40 Duration |
|
Lecture 17 | VTP Physical swtiches auto learn VTP domain | 00:04:46 Duration |
Section 17 : Spanning Tree theory and demonstrations
|
Lecture 1 | Spanning Tree Overview | 00:02:05 Duration |
|
Lecture 2 | Versions of Spanning Tree | 00:04:07 Duration |
|
Lecture 3 | Why is Spanning Tree Required | 00:07:27 Duration |
|
Lecture 4 | BPDUs and Bridge IDs | 00:02:38 Duration |
|
Lecture 5 | Demo STP Root | 00:07:37 Duration |
|
Lecture 6 | Root Ports and Designated Ports | 00:08:25 Duration |
|
Lecture 7 | Extended Bridge ID | 00:04:17 Duration |
|
Lecture 8 | PortFast | 00:02:35 Duration |
|
Lecture 9 | Path Cost Part 1 | 00:01:43 Duration |
|
Lecture 10 | Path Cost Part 2 | 00:05:30 Duration |
|
Lecture 11 | Path Cost Part 3 | 00:04:22 Duration |
|
Lecture 12 | PVST versus RPVST Port States | 00:08:23 Duration |
|
Lecture 13 | RPVST and PVST Interoperability and 802 | 00:02:36 Duration |
|
Lecture 14 | 802 | 00:03:03 Duration |
|
Lecture 15 | 802 | 00:07:10 Duration |
|
Lecture 16 | Demo 802 | 00:07:20 Duration |
|
Lecture 17 | 802 | 00:03:07 Duration |
|
Lecture 18 | 802 | 00:06:18 Duration |
|
Lecture 19 | 802 | 00:06:23 Duration |
|
Lecture 20 | Spanning Tree Comparison Summary | 00:03:35 Duration |
Section 18 : Port SPAN (Mirroring) theory and demonstrations
|
Lecture 1 | SPAN Introduction | 00:01:11 Duration |
|
Lecture 2 | SPAN network overview | 00:01:57 Duration |
|
Lecture 3 | Tests before SPAN | 00:06:28 Duration |
|
Lecture 4 | Configure SPAN | 00:08:28 Duration |
|
Lecture 5 | SPAN Ingress Options | 00:03:40 Duration |
|
Lecture 6 | SPAN Options | 00:06:14 Duration |
|
Lecture 7 | SPAN - Multiple Sessions | 00:03:25 Duration |
Section 19 : BGP theory and demonstrations
|
Lecture 1 | BGP and the CCNA | 00:01:28 Duration |
|
Lecture 2 | BGP Overview | 00:02:57 Duration |
|
Lecture 3 | BGP Looking Glass | 00:05:48 Duration |
|
Lecture 4 | GNS3 BGP Part 1 | 00:03:05 Duration |
|
Lecture 5 | GNS3 BGP Part 2 | 00:08:29 Duration |
|
Lecture 6 | GNS3 BGP Part 3 | 00:09:35 Duration |
|
Lecture 7 | GNS3 BGP Part 4 | 00:07:55 Duration |
|
Lecture 8 | GNS3 BGP Part 5 | 00:03:44 Duration |
|
Lecture 9 | GNS3 BGP Part 6 | 00:11:04 Duration |
|
Lecture 10 | GNS3 BGP Part 7 | 00:08:19 Duration |
|
Lecture 11 | GNS3 BGP Part 8 | 00:04:28 Duration |
|
Lecture 12 | GNS3 BGP Part 9 | 00:07:11 Duration |
|
Lecture 13 | GNS3 BGP Part 10 | 00:03:49 Duration |
Section 20 : Dynamic Trunk Protocol - DTP
|
Lecture 1 | DTP Theory | 00:02:08 Duration |
|
Lecture 2 | DTP GNS3 Demo Part 1 | 00:07:10 Duration |
|
Lecture 3 | DTP GNS3 Demo Part 2 | 00:03:38 Duration |
|
Lecture 4 | DTP GNS3 Demo Part 3 | 00:07:33 Duration |
|
Lecture 5 | CCNA Dynamic Trunking Protocol (DTP) Quiz | 00:28:07 Duration |
Section 21 : CDP Overview
|
Lecture 1 | CDP Introduction | 00:09:44 Duration |
|
Lecture 2 | CDP Demo | 00:06:17 Duration |
Section 22 : GNS3 Campus 1 CDP and LLDP
|
Lecture 1 | CDP Demo Basic discovery | 00:07:28 Duration |
|
Lecture 2 | CDP Demo Disable globally and per interface | 00:06:50 Duration |
|
Lecture 3 | CDP Demo Command Options | 00:04:21 Duration |
|
Lecture 4 | LLDP Demo Discover Linux Servers | 00:06:41 Duration |
Section 23 : Port Security
|
Lecture 1 | Port Security Overview | |
|
Lecture 2 | Port Security and security mechanisms | 00:01:23 Duration |
|
Lecture 3 | MAC addresses Port Security Static, Dynamic, Sticky | 00:03:11 Duration |
|
Lecture 4 | Port Security Demo Part 1 | 00:09:03 Duration |
|
Lecture 5 | Port Security Demo Part 2 | 00:09:19 Duration |
|
Lecture 6 | Port Security Demo Sticky | 00:02:53 Duration |
|
Lecture 7 | Port Security Error disable and auto recovery | 00:05:14 Duration |