Section 1 : Course Introduction
|
|
Lecture 1 | Welcome to the Course! (Updated 2021 Lecture) | 00:00:48 Duration |
|
|
Lecture 2 | What This Course Is & What It Isn't (Updated 2021 Lecture) | 00:02:49 Duration |
|
|
Lecture 3 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
|
Lecture 4 | About Certification | |
|
|
Lecture 5 | About Proctor Testing | |
|
|
Lecture 6 | Remove - INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
|
Lecture 7 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
|
Lecture 8 | About Certification | |
|
|
Lecture 9 | About Proctor Testing | |
|
|
Lecture 10 | Student Exercise Introduce Yourself |
Section 2 : Getting Started in Information Security (Updated 2021 Section)
|
|
Lecture 1 | mp4 | 00:06:06 Duration |
|
|
Lecture 2 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
|
Lecture 3 | About Certification |
Section 3 : Core Information Security Principles (Updated 2021 Section)
|
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
|
Lecture 2 | The CIA Triad (Updated 2021 Lecture) | 00:04:05 Duration |
|
|
Lecture 3 | Authentication, Authorization, and Accounting (AAA) (Updated 2021 Lecture) | 00:03:10 Duration |
|
|
Lecture 4 | Defense in Depth (Updated 2021 Lecture) | 00:03:49 Duration |
|
|
Lecture 5 | Least Privilege (Updated 2021 Lecture) | 00:01:57 Duration |
|
|
Lecture 6 | Non-Repudiation (New 2021 Lecture) | 00:03:17 Duration |
|
|
Lecture 7 | Implicit Deny (New 2021 Lecture) | 00:02:50 Duration |
|
|
Lecture 8 | Legal and Regulatory Issues (Updated 2021 Lecture) | 00:07:21 Duration |
|
|
Lecture 9 | Information Security Governance (Updated 2021 Lecture) | 00:08:06 Duration |
|
|
Lecture 10 | Authentication Basics (Updated 2021 Lecture) | 00:10:44 Duration |
|
|
Lecture 11 | Identify Proofing (Updated 2021 Lecture) | 00:03:08 Duration |
|
|
Lecture 12 | General Password Rules (Updated 2021 Lecture) | 00:08:57 Duration |
Section 4 : Risk Management (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:01:05 Duration |
|
|
Lecture 2 | Introduction to Risk Management (Updated 2021 Lecture) | 00:18:04 Duration |
|
|
Lecture 3 | Exploring Risks and Threats (Updated 2021 Lecture) | 00:06:42 Duration |
|
|
Lecture 4 | Quantitative Risk Analysis (Updated 2021 Lecture) | 00:08:13 Duration |
|
|
Lecture 5 | Attack Surface Analysis (Updated 2021 Lecture) | 00:08:28 Duration |
Section 5 : Asset Management (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:00:57 Duration |
|
|
Lecture 2 | Identifying and Classifying Assets (Updated 2021 Lecture) | 00:05:10 Duration |
|
|
Lecture 3 | Understanding the Asset Lifecycle (Updated 2021 Lecture) | 00:06:02 Duration |
|
|
Lecture 4 | Data Retention (Updated 2021 Lecture) | 00:03:47 Duration |
|
|
Lecture 5 | Understanding Data States (Updated 2021 Lecture) | 00:03:26 Duration |
Section 6 : Access Control (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:00:52 Duration |
|
|
Lecture 2 | Access Control (Updated 2021 Lecture) | 00:13:43 Duration |
|
|
Lecture 3 | Physical and Logical Access Controls (Updated 2021 Lecture) | 00:17:38 Duration |
|
|
Lecture 4 | Access Control Models (Updated 2021 Lecture) | 00:11:30 Duration |
|
|
Lecture 5 | Student Activity Analyzing Your Organization's | 00:02:06 Duration |
Section 7 : Security Malware Threats (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:01:03 Duration |
|
|
Lecture 2 | Buffer Overflows (Updated 2021 Lecture) | 00:05:08 Duration |
|
|
Lecture 3 | Viruses and Polymorphic Viruses (Updated 2021 Lecture) | 00:05:50 Duration |
|
|
Lecture 4 | Worms (Updated 2021 Lecture) | |
|
|
Lecture 5 | Trojan Horses (Updated 2021 Lecture) | 00:01:46 Duration |
|
|
Lecture 6 | Logic Bombs (Updated 2021 Lecture) | 00:02:21 Duration |
|
|
Lecture 7 | Spyware and Adware (Updated 2021 Lecture) | 00:03:11 Duration |
|
|
Lecture 8 | Ransomware (Updated 2021 Lecture) | 00:04:41 Duration |
|
|
Lecture 9 | Rootkits (Updated 2021 Lecture) | 00:03:28 Duration |
|
|
Lecture 10 | Zero Day Attacks (Updated 2021 Lecture) | 00:02:10 Duration |
|
|
Lecture 11 | Protecting Against Malware (Updated 2021 Lecture) | 00:06:36 Duration |
Section 8 : Additional Threats & Vulnerabilities (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:00:37 Duration |
|
|
Lecture 2 | Social Engineering (Updated 2021 Lecture) | 00:12:05 Duration |
|
|
Lecture 3 | Social Engineering Phone Impersonation Scenarios Overview (New 2021 Lecture) | 00:00:29 Duration |
|
|
Lecture 4 | Social Engineering Phone Call Impersonation Example #1 (New 2021 Lecture) | 00:01:22 Duration |
|
|
Lecture 5 | Social Engineering Phone Call Impersonation Example #2 (New 2021 Lecture) | |
|
|
Lecture 6 | Social Engineering Phone Call Impersonation Example #3 (New 2021 Lecture) | 00:00:43 Duration |
|
|
Lecture 7 | Social Engineering Phone Impersonation Scenarios Discussion | 00:03:39 Duration |
|
|
Lecture 8 | Email Spam, Spoofing, Phishing, and Pharming (Updated 2021 Lecture) | 00:12:55 Duration |
|
|
Lecture 9 | Protocol Spoofing (Updated 2021 Lecture) | 00:09:05 Duration |
|
|
Lecture 10 | Common Attack Methods (Updated 2021 Lecture) | 00:10:06 Duration |
|
|
Lecture 11 | Course Review Request | 00:00:39 Duration |
Section 9 : Network Segmentation & Isolation (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:01:39 Duration |
|
|
Lecture 2 | Introduction to Network Isolation (Updated 2021 Lecture) | 00:01:52 Duration |
|
|
Lecture 3 | Demilitarized Zone (DMZ) (Updated 2021 Lecture) | 00:05:28 Duration |
|
|
Lecture 4 | Basic Network Zones (Updated 2021 Lecture) | 00:05:05 Duration |
|
|
Lecture 5 | Virtual LANs (VLANs) (Updated 2021 Lecture) | 00:03:52 Duration |
|
|
Lecture 6 | Routers (Updated 2021 Lecture) | 00:03:04 Duration |
|
|
Lecture 7 | Network Address Translation (NAT) (Updated 2021 Lecture) | 00:07:54 Duration |
|
|
Lecture 8 | Access Control Lists (ACLs) (New 2021 Lecture) | 00:04:28 Duration |
Section 10 : Network Security (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:00:31 Duration |
|
|
Lecture 2 | Virtual Private Networks (Updated 2021 Lecture) | 00:07:37 Duration |
|
|
Lecture 3 | Firewalls (Updated 2021 Lecture) | 00:11:11 Duration |
|
|
Lecture 4 | Web Proxy Servers (Updated 2021 Lecture) | 00:02:42 Duration |
|
|
Lecture 5 | Honeypots (Updated 2021 Lecture) | 00:02:24 Duration |
|
|
Lecture 6 | Intrusion Detection & Prevention Systems (Updated 2021 Lecture) | 00:02:54 Duration |
Section 11 : Wireless Networking Security (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:00:52 Duration |
|
|
Lecture 2 | Wireless Encryption Standards (Updated 2021 Lecture) | 00:02:15 Duration |
|
|
Lecture 3 | Wireless Equivalent Privacy (WEP) (Updated 2021 Lecture) | 00:03:03 Duration |
|
|
Lecture 4 | Wi-Fi Protected Access (WPA) (Updated 2021 Lecture) | 00:02:34 Duration |
|
|
Lecture 5 | Wi-Fi Protected Access 2 (WPA2) (Updated 2021 Lecture) | 00:03:54 Duration |
|
|
Lecture 6 | Wi-Fi Protected Access 3 (WPA3) (Updated 2021 Lecture) | 00:03:17 Duration |
|
|
Lecture 7 | WPA Enterprise vs | 00:03:15 Duration |
|
|
Lecture 8 | Wireless Network Vulnerabilities & Security (New 2021 Lecture) | 00:12:31 Duration |
|
|
Lecture 9 | Common Wireless Security Threats (Updated 2021 Lecture) | 00:06:13 Duration |
Section 12 : Security Assessments and Testing (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:01:01 Duration |
|
|
Lecture 2 | Vulnerability Assessments (Updated 2021 Lecture) | |
|
|
Lecture 3 | Penetration Testing (Updated 2021 Lecture) | 00:12:27 Duration |
|
|
Lecture 4 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
|
Lecture 5 | Security Assessments (Updated 2021 Lecture) |
Section 13 : Security Assessment Tools (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:01:23 Duration |
|
|
Lecture 2 | Wireshark Network Sniffing (Updated 2021 Lecture) | 00:04:31 Duration |
|
|
Lecture 3 | Nmap Zenmap Network Scanner (Updated 2021 Lecture) | 00:06:19 Duration |
|
|
Lecture 4 | Tenable Nessus Vulnerability Scanner (Updated 2021 Lecture) | 00:04:39 Duration |
|
|
Lecture 5 | About Certification |
Section 14 : Hardening End-User Systems and Servers (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | |
|
|
Lecture 2 | Hardening End-User Systems (Updated 2021 Lecture) | 00:07:46 Duration |
|
|
Lecture 3 | Hardening Servers (Updated 2021 Lecture) | 00:03:51 Duration |
|
|
Lecture 4 | Patch and Change Management (Updated 2021 Lecture) | 00:04:46 Duration |
|
|
Lecture 5 | Separation of Services (Updated 2021 Lecture) | 00:03:04 Duration |
Section 15 : Introduction to Cryptography (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:00:56 Duration |
|
|
Lecture 2 | Introduction to Cryptography (Updated 2021 Lecture) | 00:05:32 Duration |
|
|
Lecture 3 | Symmetric Encryption (Updated 2021 Lecture) | 00:08:47 Duration |
|
|
Lecture 4 | Asymmetric Encryption (Updated 2021 Lecture) | 00:04:30 Duration |
|
|
Lecture 5 | Hashing Algorithms (Updated 2021 Lecture) | 00:07:13 Duration |
|
|
Lecture 6 | Digital Certificates and Certificate Authorities (Updated 2021 Lecture) | 00:08:06 Duration |
|
|
Lecture 7 | Email Encryption Use Cases (Updated 2021 Lecture) | 00:12:17 Duration |
|
|
Lecture 8 | Windows Encrypted File System Use Case (Updated 2021 Lecture) | 00:06:15 Duration |
|
|
Lecture 9 | Revisiting VPN (Updated 2021 Lecture) | 00:05:13 Duration |
|
|
Lecture 10 | Software versus Hardware-Based Encryption (Updated 2021 Lecture) | 00:04:15 Duration |
|
|
Lecture 11 | SW-vs-HW-Based-Encryption |
Section 16 : Incident Response, Disaster Recovery & Business Continuity (Updated 2021 Section
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:00:57 Duration |
|
|
Lecture 2 | Understanding Incidents and Disasters (Updated 2021 Lecture) | 00:02:54 Duration |
|
|
Lecture 3 | Incident Response (Updated 2021 Lecture) | 00:05:50 Duration |
|
|
Lecture 4 | Disaster Recovery and Business Continuity (Updated 2021 Lecture) | 00:18:43 Duration |
Section 17 : Application Development Security (New 2021 Section)
|
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
|
Lecture 2 | Importance of IT Security in Application Development (New 2021 Lecture) | 00:03:51 Duration |
|
|
Lecture 3 | Software Development Lifecycle (SDLC) (New 2021 Lecture) | 00:14:08 Duration |
|
|
Lecture 4 | Static and Dynamic Testing (New 2021 Lecture) | 00:02:58 Duration |
|
|
Lecture 5 | Authorization to Operate (ATO) (New 2021 Lecture) | 00:03:48 Duration |
Section 18 : Personnel Policies (Updated 2021 Section)
|
|
Lecture 1 | Section Introduction (Updated 2021 Lecture) | 00:01:00 Duration |
|
|
Lecture 2 | Acceptable Use (Updated 2021 Lecture) | 00:02:17 Duration |
|
|
Lecture 3 | Code of Ethics (Updated 2021 Lecture) | 00:03:22 Duration |
|
|
Lecture 4 | Mandatory Vacations (Updated 2021 Lecture) | 00:02:39 Duration |
|
|
Lecture 5 | Separation of Duties (Updated 2021 Lecture) | 00:04:05 Duration |
|
|
Lecture 6 | Job Rotation (Updated 2021 Lecture) | 00:01:56 Duration |
|
|
Lecture 7 | Education and Training (Updated 2021 Lecture) | 00:04:34 Duration |
Section 19 : Class Mini-Case Scenarios (Updated 2021 Section)
|
|
Lecture 1 | About Proctor Testing | |
|
|
Lecture 2 | Class Mini-Case Scenario #1 Small Tax Accounting Office (Updated 2021) | |
|
|
Lecture 3 | Class Mini-Case Scenario #2 Growing Marketing Business (Updated 2021) |