Section 1 : Introduction

Lecture 1 Introduction 00:03:04 Duration
Lecture 2 Course Work Overview 00:01:54 Duration
Lecture 3 Sample Tool 1 - Log Analyzer 00:10:23 Duration
Lecture 4 Sample Tool 1 - Text Instructions
Lecture 5 Sample Tool 2 - Password Checker 00:07:26 Duration
Lecture 6 Sample Tool 2 - Text Instructions
Lecture 7 Development Environment Overview 00:04:34 Duration
Lecture 8 Important course updates (don't skip)

Section 2 : Cyber Security

Lecture 1 Cyber Security Introduction to Section 2 00:00:46 Duration
Lecture 2 What is Cyber Security 00:08:01 Duration
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 4 Intro to Python and Python crash course (section 7) for beginners
Lecture 5 repl 00:06:34 Duration
Lecture 6 Penetration Testing - Overview 00:05:32 Duration
Lecture 7 Penetration Testing - Code Example 00:05:27 Duration
Lecture 8 Penetration Testing - Text Instructions
Lecture 9 Penetration Testing - Remediation 00:08:28 Duration
Lecture 10 Port Scanning - Overview 00:04:30 Duration
Lecture 11 Port Scanning - Code Example
Lecture 12 Port Scanning - Text Instructions
Lecture 13 Port Scanning - Remediation 00:03:52 Duration
Lecture 14 Botnets - Overview 00:06:02 Duration
Lecture 15 Botnets - Code Example 00:05:06 Duration
Lecture 16 Botnets - Code Example Continued 00:05:05 Duration
Lecture 17 Botnets - Text Instructions
Lecture 18 Botnets - Remediation 00:12:15 Duration
Lecture 19 Code Exploits - Overview 00:04:52 Duration
Lecture 20 Code Exploits - Code Example 00:05:33 Duration
Lecture 21 Code Exploits - Text Instructions
Lecture 22 Code Exploits - Remediation 00:03:55 Duration
Lecture 23 Forensic Investigation - Overview 00:05:31 Duration
Lecture 24 Forensic Investigation - Code Example 00:08:30 Duration
Lecture 25 Forensic Investigation - Text Instructions
Lecture 26 Forensic Investigation - Remediation 00:05:09 Duration
Lecture 27 Network Traffic Analysis - Overview 00:05:11 Duration
Lecture 28 Network Traffic Analysis - Code Example 00:04:28 Duration
Lecture 29 Network Traffic Analysis - Text Instructions
Lecture 30 Network Traffic Analysis - Remediation 00:03:44 Duration
Lecture 31 Wireless - Overview 00:04:33 Duration
Lecture 32 Wireless - Code Example 00:03:08 Duration
Lecture 33 Wireless - Text Instructions
Lecture 34 Wireless - Remediation 00:09:59 Duration
Lecture 35 Web Reconnaissance - Overview 00:05:32 Duration
Lecture 36 Web Reconnaissance - Code Example 00:09:37 Duration
Lecture 37 Web Reconnaissance - Text Instructions
Lecture 38 Web Reconnaissance - Remediation 00:06:31 Duration
Lecture 39 Antivirus Evasion - Overview 00:05:40 Duration
Lecture 40 Antivirus Evasion - Code Example 00:07:02 Duration
Lecture 41 Antivirus Evasion - Text Instructions
Lecture 42 Antivirus Evasion - Remediation 00:03:33 Duration
Lecture 43 Social Engineering - Overview 00:06:57 Duration
Lecture 44 Social Engineering - Code Example 00:04:30 Duration
Lecture 45 Social Engineering - Text Instructions
Lecture 46 Social Engineering - Remediation 00:02:57 Duration

Section 3 : Building a Security Tool

Lecture 1 Introduction to Section 3 - Building your own tool with Python 00:01:16 Duration
Lecture 2 Installing Python Locally
Lecture 3 Tool Development with Python - Overview 00:04:54 Duration
Lecture 4 Introduction to Pip 00:03:56 Duration
Lecture 5 Introduction to Pip - Text Instructions
Lecture 6 Basic Python Script 00:03:24 Duration
Lecture 7 Basic Python Script - Text Instructions
Lecture 8 Command Line Arguments 00:03:16 Duration
Lecture 9 Command Line Arguments - Text Instructions
Lecture 10 Argument Parsing 00:06:29 Duration
Lecture 11 Argument Parsing - Text Instructions
Lecture 12 Validating Input 00:03:37 Duration
Lecture 13 Validating Input - Text Instructions
Lecture 14 Sending Requests to the Web 00:02:41 Duration
Lecture 15 Sending Requests to the Web - Text Instructions
Lecture 16 Parsing Results 00:06:44 Duration
Lecture 17 Parsing Results - Text Instructions
Lecture 18 Checking Forms 00:04:32 Duration
Lecture 19 Checking Forms - Text Instructions
Lecture 20 Generating the Report 00:02:19 Duration
Lecture 21 Generating the Report - Text Instructions
Lecture 22 Checking Comments 00:06:33 Duration
Lecture 23 Checking Comments - Text Instructions
Lecture 24 Checking Inputs 00:05:12 Duration
Lecture 25 Checking Inputs - Text Instructions
Lecture 26 Improving the Report 00:02:58 Duration
Lecture 27 Improving the Report - Text Instructions
Lecture 28 Configuration from File 00:03:42 Duration
Lecture 29 Configuration from File - Text Instructions
Lecture 30 Using Config Settings 00:07:16 Duration
Lecture 31 Using Config Settings - Text Instructions
Lecture 32 Merging the Configs 00:02:09 Duration
Lecture 33 Merging the Configs - Text Instructions
Lecture 34 Outputting the Report 00:08:36 Duration
Lecture 35 Outputting the Report - Text Instructions
Lecture 36 Pushing to GitHub 00:04:29 Duration
Lecture 37 Pushing to GitHub - Text Instructions
Lecture 38 Testing the Tool 00:06:05 Duration
Lecture 39 Writing the Documentation 00:06:24 Duration
Lecture 40 Distributing Your Tool 00:05:49 Duration

Section 4 : Web Application Security

Lecture 1 Section 4 Introduction 00:01:17 Duration
Lecture 2 Web Application Security Introduction 00:06:00 Duration
Lecture 3 OWASP Overview 00:04:37 Duration
Lecture 4 Introduction to the OWASP Top 10 00:01:28 Duration
Lecture 5 Rails Overview 00:03:15 Duration
Lecture 6 PHP Overview 00:05:09 Duration
Lecture 7 Installing Rails and PHP
Lecture 8 OWASP Top 10 Vulnerabilities Example Code - Where to get it
Lecture 9 Command Injection - Overview 00:04:49 Duration
Lecture 10 Command Injection - Rails Example 00:06:44 Duration
Lecture 11 Command Injection - Rails example - Text Instructions
Lecture 12 Command Injection - PHP Example 00:04:10 Duration
Lecture 13 Command Injection - PHP example - Text Instructions
Lecture 14 SQL Injection - Overview 00:06:26 Duration
Lecture 15 SQL Injection - Rails Example 00:03:59 Duration
Lecture 16 SQL Injection - Rails example - Text Instructions
Lecture 17 SQL Injection - PHP Example 00:03:32 Duration
Lecture 18 SQL Injection Remediation - PHP Example 00:02:26 Duration
Lecture 19 SQL Injection - PHP example - Text Instructions
Lecture 20 Password Complexity - Overview 00:06:47 Duration
Lecture 21 Password Complexity - Rails Example 00:06:50 Duration
Lecture 22 Password Complexity - Rails example - Text Instructions
Lecture 23 Password Complexity - PHP Example 00:06:28 Duration
Lecture 24 Password Complexity - PHP example - Text Instructions
Lecture 25 Information Leakage - Overview
Lecture 26 Information Leakage - Rails Example
Lecture 27 Information Leakage - Rails example - Text Instructions
Lecture 28 Information Leakage - PHP Example
Lecture 29 Information Leakage - PHP example - Text Instructions
Lecture 30 Sensitive Data Exposure - Overview 00:04:53 Duration
Lecture 31 Sensitive Data Exposure - Rails Example 00:04:23 Duration
Lecture 32 Sensitive Data Exposure - Rails example - Text Instructions
Lecture 33 Sensitive Data Exposure - PHP Example 00:02:54 Duration
Lecture 34 Sensitive Data Exposure - PHP example - Text Instructions
Lecture 35 XML External Entities (XXE) - Overview 00:04:41 Duration
Lecture 36 XML External Entities (XXE) - Rails Example 00:04:36 Duration
Lecture 37 XML External Entities (XXE) - Rails example - Text Instructions
Lecture 38 XML External Entities (XXE) - PHP Example 00:04:29 Duration
Lecture 39 XML External Entities (XXE) - PHP example - Text Instructions
Lecture 40 Broken Access Control - Overview 00:05:13 Duration
Lecture 41 Broken Access Control - Rails Example 00:11:56 Duration
Lecture 42 Broken Access Control - Rails example - Text Instructions
Lecture 43 Broken Access Control - PHP Example 00:03:40 Duration
Lecture 44 Broken Access Control - PHP example - Text Instructions
Lecture 45 Security Misconfiguration - Overview 00:05:51 Duration
Lecture 46 Security Misconfiguration - Rails Example 00:03:46 Duration
Lecture 47 Security Misconfiguration - Rails example - Text Instructions
Lecture 48 Security Misconfiguration - PHP Example 00:03:29 Duration
Lecture 49 Security Misconfiguration - PHP example - Text Instructions
Lecture 50 Cross-Site Scripting (XSS) - Overview 00:01:34 Duration
Lecture 51 Cross-Site Scripting (XSS) - Rails Example 00:05:09 Duration
Lecture 52 Cross-Site Scripting (XSS) - Rails example - Text Instructions
Lecture 53 Cross-Site Scripting (XSS) - PHP Example 00:05:50 Duration
Lecture 54 Cross-Site Scripting (XSS) - PHP example - Text Instructions
Lecture 55 Insecure Deserialization - Overview 00:03:47 Duration
Lecture 56 Insecure Deserialization - Rails Example 00:05:19 Duration
Lecture 57 Insecure Deserialization - Rails example - Text Instructions
Lecture 58 Insecure Deserialization - PHP Example 00:07:22 Duration
Lecture 59 Insecure Deserialization - PHP example - Text Instructions
Lecture 60 Using Components with Known Vulnerabilities - Overview 00:05:28 Duration
Lecture 61 Using Components with Known Vulnerabilities - Rails Example 00:11:01 Duration
Lecture 62 Using Components with Known Vulnerabilities - Rails example - Text Instructions
Lecture 63 Using Components with Known Vulnerabilities - PHP Example 00:04:38 Duration
Lecture 64 Using Components with Known Vulnerabilities - PHP example - Text Instructions
Lecture 65 Insufficient Logging and Monitoring - Overview 00:04:07 Duration
Lecture 66 Insufficient Logging Monitoring - Rails example 00:05:49 Duration
Lecture 67 Insufficient Logging and Monitoring - Rails Example - Text Instructions
Lecture 68 Insufficient Logging Monitoring - PHP example - Text Instructions 00:06:15 Duration
Lecture 69 Insufficient Logging and Monitoring - PHP Example - Text Instructions
Lecture 70 Web Security Analysis Tool 00:09:18 Duration

Section 5 : Topics in Cyber Security

Lecture 1 Multi-Factor Authentication 00:16:35 Duration
Lecture 2 Ethical Hacking 00:05:08 Duration
Lecture 3 Password Complexity 00:11:19 Duration
Lecture 4 Physical Security
Lecture 5 Data Breaches 00:09:35 Duration
Lecture 6 Cloud Security 00:11:45 Duration

Section 6 : Python Password Encryption Tool

Lecture 1 Password Encryption Tool Introduction 00:00:57 Duration
Lecture 2 Password Encryption Overview 00:02:35 Duration
Lecture 3 Creating the Tool 00:02:49 Duration
Lecture 4 Command Line Arguments 00:04:15 Duration
Lecture 5 Adding Encryption 00:04:46 Duration
Lecture 6 Check If Encryption Works 00:02:33 Duration
Lecture 7 Password Encryption Tool - Source Code

Section 7 : Python Crash Course

Lecture 1 Installation and expectations
Lecture 2 Strings
Lecture 3 Numbers
Lecture 4 Lists, Tuples, Sets
Lecture 5 Dictionaries
Lecture 6 Branching and FunctionsMethods
Lecture 7 Standard library and imports
Lecture 8 Object Oriented Programming Classes

Section 8 : Summary

Lecture 1 Thank You! 00:01:08 Duration