Section 1 : Introduction

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 2 About Proctor Testing
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 4 Target Audience 00:01:54 Duration
Lecture 5 Study Recommendations 00:04:19 Duration
Lecture 6 About Proctor Testing
Lecture 7 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM

Section 2 : Goals and Learning Objectives - Volume 2

Lecture 1 Goals and Learning Objectives - Volume 2 00:03:09 Duration

Section 3 : Routers - Port and Vulnerability scanning

Lecture 1 Goals and Learning Objectives 00:00:28 Duration
Lecture 2 The Home Router 00:13:44 Duration
Lecture 3 External Vulnerability Scanning - Shodan, Qualys & Nmap 00:16:23 Duration
Lecture 4 Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS 00:19:33 Duration
Lecture 5 Open Source Custom Router Firmware 00:11:37 Duration

Section 4 : Firewalls

Lecture 1 Goals and Learning Objectives 00:00:25 Duration
Lecture 2 Firewalls – Host-based, network-based and virtual Part 1 00:14:49 Duration
Lecture 3 Firewalls – Host-based, network-based and virtual Part 2 00:04:54 Duration
Lecture 4 Windows - Host Based Firewalls - Windows Firewall 00:10:29 Duration
Lecture 5 Windows - Host Based Firewalls - Windows Firewall Control (WFC) 00:05:18 Duration
Lecture 6 Windows - Host Based Firewalls - Third Party 00:08:45 Duration
Lecture 7 Linux - Host Based Firewalls - iptables 00:19:59 Duration
Lecture 8 Linux - Host Based Firewalls - UFW, gufw & nftables 00:12:08 Duration
Lecture 9 Mac - Host based Firewalls - Application Firewall & PF 00:13:52 Duration
Lecture 10 Mac - Host based Firewalls - pflist, Icefloor & Murus 00:07:48 Duration
Lecture 11 Mac - Host based Firewalls - Little Snitch 00:06:22 Duration
Lecture 12 Network based firewalls - Routers - DD-WRT 00:05:09 Duration
Lecture 13 Network based firewalls - Hardware
Lecture 14 Network based firewalls - pfSense, Smoothwall and Vyos 00:10:34 Duration

Section 5 : Network Attacks, Architecture and Isolation

Lecture 1 Goals and Learning Objectives 00:00:18 Duration
Lecture 2 Network Attacks and Network Isolation - Introduction and IOT 00:06:35 Duration
Lecture 3 Network Attacks and Network Isolation - Arp Spoofing and Switches 00:06:20 Duration
Lecture 4 Effective Network Isolation Part 1 00:12:28 Duration
Lecture 5 Effective Network Isolation Part 2 00:07:27 Duration

Section 6 : Wireless and Wi-Fi Security

Lecture 1 Goals and Learning Objectives 00:00:25 Duration
Lecture 2 Wi-Fi Weaknesses - WEP 00:02:28 Duration
Lecture 3 Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP 00:13:41 Duration
Lecture 4 Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP 00:06:50 Duration
Lecture 5 Wi-Fi Security Testing 00:04:01 Duration
Lecture 6 Wireless Security - Secure Configuration and Network Isolation 00:14:18 Duration
Lecture 7 Wireless security - RF Isolation and Reduction 00:03:01 Duration
Lecture 8 Wireless security - Who is on my Wi-Fi Network 00:03:20 Duration

Section 7 : Network Monitoring for Threats

Lecture 1 Goals and Learning Objectives 00:00:17 Duration
Lecture 2 Syslog 00:17:00 Duration
Lecture 3 Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1 00:14:01 Duration
Lecture 4 Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2 00:07:59 Duration
Lecture 5 Wireshark - Finding malware and hackers - Part 1 00:15:46 Duration
Lecture 6 Wireshark - Finding malware and hackers - Part 2 00:08:12 Duration
Lecture 7 Network Monitoring - Wincap, NST, Netminer and NetWorx 00:01:39 Duration

Section 8 : How We Are Tracked Online

Lecture 1 Goals and Learning Objectives 00:00:23 Duration
Lecture 2 Types of Tracking 00:04:25 Duration
Lecture 3 IP Address 00:05:27 Duration
Lecture 4 3rd Party Connections 00:04:25 Duration
Lecture 5 HTTP Referer 00:03:21 Duration
Lecture 6 Cookies and Scripts 00:08:00 Duration
Lecture 7 Super Cookies 00:05:13 Duration
Lecture 8 Browser Fingerprinting and Browser Volunteered Information 00:02:37 Duration
Lecture 9 Browser and Browser Functionality 00:01:40 Duration
Lecture 10 More Tracking 00:02:48 Duration
Lecture 11 Browser and Internet Profiling 00:06:35 Duration

Section 9 : Search Engines and Privacy

Lecture 1 Goals and Learning Objectives 00:00:20 Duration
Lecture 2 Search Engine Tracking, Censorship and Privacy 00:12:44 Duration
Lecture 3 Ixquick and Startpage 00:07:56 Duration
Lecture 4 DuckDuckGo 00:03:44 Duration
Lecture 5 Disconnect search 00:04:44 Duration
Lecture 6 YaCy 00:03:32 Duration
Lecture 7 Private and Anonymous Searching 00:07:35 Duration

Section 10 : Browser Security and Tracking Prevention

Lecture 1 Goals and Learning Objectives 00:00:21 Duration
Lecture 2 Which Browser – Choice of Browser 00:06:01 Duration
Lecture 3 Reducing the Browser Attack Surface 00:11:35 Duration
Lecture 4 Browser Hacking Demo
Lecture 5 Browser Isolation and Compartmentalization 00:06:10 Duration
Lecture 6 Firefox Security, Privacy and Tracking
Lecture 7 uBlock origin - HTTP Filters, ad and track blockers 00:14:13 Duration
Lecture 8 uMatrix - HTTP Filters, ad and track blockers 00:07:14 Duration
Lecture 9 Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers 00:06:38 Duration
Lecture 10 ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers 00:06:46 Duration
Lecture 11 No-script - HTTP Filters, ad and track blockers 00:08:29 Duration
Lecture 12 Policeman and others - HTTP Filters, ad and track blockers 00:03:56 Duration
Lecture 13 History, Cookies and Super cookies Part 1 00:11:43 Duration
Lecture 14 History, Cookies and Super cookies Part 2 00:12:13 Duration
Lecture 15 HTTP Referer 00:02:19 Duration
Lecture 16 Browser Fingerprinting 00:18:26 Duration
Lecture 17 Certificates and Encryption 00:11:29 Duration
Lecture 18 Firefox Hardening 00:18:50 Duration

Section 11 : Passwords and Authentication Methods

Lecture 1 Goals and Learning Objectives 00:00:31 Duration
Lecture 2 Password Attacks 00:03:22 Duration
Lecture 3 How Passwords are Cracked - Hashes - Part 1 00:16:17 Duration
Lecture 4 How Passwords are Cracked - Hashcat - Part 2 00:07:09 Duration
Lecture 5 Operating System Passwords 00:02:28 Duration
Lecture 6 Password Managers - An Introduction 00:02:07 Duration
Lecture 7 Password Managers - Master Password 00:05:13 Duration
Lecture 8 Password Managers - KeePass, KeePassX and KeyPassXC
Lecture 9 Password Managers - LastPass
Lecture 10 Password Managers - Hardening Lastpass 00:07:35 Duration
Lecture 11 Creating a Strong Password That You Can Remember - Part 1 00:08:53 Duration
Lecture 12 Creating a Strong Password That You Can Remember - Part 2 00:09:23 Duration
Lecture 13 Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy 00:10:54 Duration
Lecture 14 Multi-Factor Authentication - Hard Tokens - 2FA Dongles 00:05:54 Duration
Lecture 15 Choosing a Method of Multi-Factor Authentication 00:02:50 Duration
Lecture 16 Multi-Factor Authentication - Strengths and Weaknesses 00:02:10 Duration
Lecture 17 The Future of Password and Authentication 00:01:23 Duration

Section 12 : Wrap Up

Lecture 1 About Proctor Testing
Lecture 2 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 3 Which VPN protocol is best to use and why 00:11:44 Duration
Lecture 4 Email Tracking and Hacking 00:10:33 Duration
Lecture 5 Security Vulnerabilities, Threats and Adversaries 00:04:37 Duration