Section 1 : Introduction
|
Lecture 1 | About Proctor Testing | |
|
Lecture 2 | Introduction to the Instructor! | 00:01:27 Duration |
|
Lecture 3 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 4 | Target Audience | 00:01:54 Duration |
|
Lecture 5 | Study Recommendations | 00:04:20 Duration |
|
Lecture 6 | Course updates | 00:00:40 Duration |
|
Lecture 7 | Cyber Security and Ethical Hacking Careers | 00:02:17 Duration |
Section 2 : Goals and Learning Objectives - Volume 4
|
Lecture 1 | What is End Point Protection and why is it important | 00:04:38 Duration |
|
Lecture 2 | Goals and Learning Objectives - Volume 4 | 00:03:27 Duration |
Section 3 : File and Disk Encryption
Section 4 : Anti-Virus and End-Point-Protection
|
Lecture 1 | Goals and Learning Objectives | 00:00:38 Duration |
|
Lecture 2 | Is Anti-Virus dead - The Threat Landscape | 00:03:55 Duration |
|
Lecture 3 | Is Anti-Virus dead - Protection Methods | 00:10:53 Duration |
|
Lecture 4 | Ransomware | 00:04:17 Duration |
|
Lecture 5 | Anti-Virus and End-Point-Protection Testing | 00:05:40 Duration |
|
Lecture 6 | The Problem With AV and EPP Testing | 00:03:38 Duration |
|
Lecture 7 | The Best of Business End-Point-Protection (EPP) | 00:04:05 Duration |
|
Lecture 8 | Windows - The Best of Anti-Virus and End-Point-Protection | 00:04:05 Duration |
|
Lecture 9 | Business End Point Protection (EPP) | 00:02:24 Duration |
|
Lecture 10 | Mac - XProtect | 00:02:51 Duration |
|
Lecture 11 | Mac - The Best of Anti-Virus and End-Point-Protection | 00:02:35 Duration |
|
Lecture 12 | Linux - The Best of Anti-Virus and End-Point-Protection | 00:02:41 Duration |
|
Lecture 13 | Online and Second Opinion - Anti-Virus and End-Point-Protection | 00:03:12 Duration |
|
Lecture 14 | Is Anti-Virus and End-Point-Protection Dangerous | 00:06:35 Duration |
Section 5 : Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
|
Lecture 1 | Goals and Learning Objectives | 00:00:34 Duration |
|
Lecture 2 | Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) | 00:05:00 Duration |
|
Lecture 3 | End Point Detection and Response (EDR) | 00:06:39 Duration |
|
Lecture 4 | End-Point-Protection How it works together in layers | 00:06:57 Duration |
Section 6 : End-Point-Protection Technology
Section 7 : Threat Detection and Monitoring
Section 8 : Malware and Hacker Hunting on the End-Point
Section 9 : Operating System and Application Hardening
|
Lecture 1 | Goals and Learning Objectives | 00:00:48 Duration |
|
Lecture 2 | An Introduction to Hardening | 00:05:28 Duration |
|
Lecture 3 | Hardening Standards | 00:10:01 Duration |
|
Lecture 4 | OpenSCAP | 00:12:46 Duration |
|
Lecture 5 | Baseline Auditing | 00:03:32 Duration |
|
Lecture 6 | Windows - Hardening | 00:01:54 Duration |
|
Lecture 7 | Windows - Security Compliance Manager (SCM) | 00:11:02 Duration |
|
Lecture 8 | Mac – Hardening | 00:01:36 Duration |
|
Lecture 9 | Linux – Hardening | 00:03:31 Duration |
|
Lecture 10 | Security Focused Operating Systems | 00:04:50 Duration |
|
Lecture 11 | Monitoring for Security Drift | 00:01:16 Duration |
Section 10 : Secure Deleting, Evidence Elimination and Anti-Forensics
|
Lecture 1 | Goals and Learning Objectives | 00:00:43 Duration |
|
Lecture 2 | Secure File Deletion - Mechanical drives | 00:08:11 Duration |
|
Lecture 3 | Secure File Deletion - Solid Sate Drives | 00:06:37 Duration |
|
Lecture 4 | Evidence Elimination & Anti-Forensics - An Introduction | 00:04:42 Duration |
|
Lecture 5 | Evidence Elimination - CCleaner and Bleachit | 00:07:03 Duration |
|
Lecture 6 | Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer | 00:05:50 Duration |
|
Lecture 7 | Disk Wiping - Mechanical Drives | 00:05:46 Duration |
|
Lecture 8 | Disk Wiping - Solid State Drives (SSD) | 00:10:54 Duration |
|
Lecture 9 | Scrubbing EXIF & Metadata Part 1 - Introduction | 00:06:56 Duration |
|
Lecture 10 | Scrubbing EXIF & Metadata Part 2 - Tools | 00:05:14 Duration |
|
Lecture 11 | Scrubbing EXIF & Metadata Part 3 - Guidance | 00:04:37 Duration |
|
Lecture 12 | Sensor Noise Camera Identification | 00:04:06 Duration |
Section 11 : Email Security, Privacy and Anonymity
|
Lecture 1 | Goals and Learning Objectives | 00:01:05 Duration |
|
Lecture 2 | Clients, Protocols and Authentication | 00:13:17 Duration |
|
Lecture 3 | Email Weaknesses | 00:13:02 Duration |
|
Lecture 4 | PGP, GPG & Privacy | 00:05:50 Duration |
|
Lecture 5 | PGP & GPG Clients | 00:06:28 Duration |
|
Lecture 6 | Windows - PGP & GPG | 00:19:53 Duration |
|
Lecture 7 | Tail - PGP & GPG | 00:04:01 Duration |
|
Lecture 8 | PGP & GPG Weaknesses | 00:06:15 Duration |
|
Lecture 9 | Improving OpenPGP Security - Best Practices - Part 1 | 00:02:32 Duration |
|
Lecture 10 | Improving OpenPGP Security - Primary and Subkeys - Part 2 | 00:12:21 Duration |
|
Lecture 11 | Improving OpenPGP Security - SmartcardsYubikey - Part 3 | 00:07:42 Duration |
|
Lecture 12 | Email Tracking & Exploits | 00:10:33 Duration |
|
Lecture 13 | Email Anonymity & Pseudonymity | 00:06:18 Duration |
|
Lecture 14 | TorBirdy | 00:07:36 Duration |
|
Lecture 15 | Remailers | 00:07:34 Duration |
|
Lecture 16 | Choosing an Email Provider | 00:13:47 Duration |
|
Lecture 17 | Email Alternatives | 00:03:17 Duration |
Section 12 : Messengers - Security, Privacy and Anonymity
|
Lecture 1 | Goals and Learning Objectives | 00:00:20 Duration |
|
Lecture 2 | An Introduction to Instant Messengers | 00:03:09 Duration |
|
Lecture 3 | Instant Messenger - Signal | 00:02:31 Duration |
|
Lecture 4 | Instant Messengers - Chatsecure | 00:01:39 Duration |
|
Lecture 5 | Instant Messengers - Cryptocat | 00:00:45 Duration |
|
Lecture 6 | Instant Messengers - Ricochet | 00:00:46 Duration |
|
Lecture 7 | Instant Messengers - Other | 00:00:38 Duration |
|
Lecture 8 | Video and Voice Messengers - Linphone | 00:04:29 Duration |
|
Lecture 9 | Video and Voice Messengers - Jitsi | 00:01:40 Duration |
|
Lecture 10 | Video and Voice Messengers - Other | 00:00:57 Duration |
Section 13 : Wrap Up
|
Lecture 1 | About Proctor Testing | |
|
Lecture 2 | Remove - INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 3 | Qubes OS | 00:19:08 Duration |
|
Lecture 4 | Effective Network Isolation | 00:12:28 Duration |
|
Lecture 5 | Socks5 proxy tunneling | 00:10:20 Duration |