Section 1 : Introduction

Lecture 1 About Proctor Testing
Lecture 2 Introduction to the Instructor! 00:01:27 Duration
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 4 Target Audience 00:01:54 Duration
Lecture 5 Study Recommendations 00:04:20 Duration
Lecture 6 Course updates 00:00:40 Duration
Lecture 7 Cyber Security and Ethical Hacking Careers 00:02:17 Duration

Section 2 : Goals and Learning Objectives - Volume 4

Lecture 1 What is End Point Protection and why is it important 00:04:38 Duration
Lecture 2 Goals and Learning Objectives - Volume 4 00:03:27 Duration

Section 3 : File and Disk Encryption

Lecture 1 Goals and Learning Objectives
Lecture 2 Disk Encryption – What is it good for 00:07:48 Duration
Lecture 3 Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation 00:05:29 Duration
Lecture 4 Disk Encryption Attacks - Physical 00:11:18 Duration
Lecture 5 Disk Encryption Attacks - Containers, Volumes and Partitions 00:02:22 Duration
Lecture 6 Windows - Disk Encryption - An Introduction 00:02:40 Duration
Lecture 7 Windows - Disk Encryption - Bitlocker 00:12:07 Duration
Lecture 8 Windows - Setting Up BitLocker 00:09:30 Duration
Lecture 9 Windows - Disk Encryption - VeraCrypt
Lecture 10 Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt 00:03:06 Duration
Lecture 11 Windows, Mac & Linux - Setting up VeraCrypt 00:11:43 Duration
Lecture 12 Mac - Filevault2 00:05:39 Duration
Lecture 13 Mac - Setting up Filevault2 00:07:36 Duration
Lecture 14 Linux Whole Disk Encryption - Dm-crypt and LUKS 00:05:55 Duration
Lecture 15 Linux - Setting up DMCryptLUKS 00:05:10 Duration
Lecture 16 Linux - Encrypting the boot partition with Grub2 00:04:47 Duration
Lecture 17 Self Encrypting Drives (SEDs) 00:01:47 Duration
Lecture 18 Defense Against Disk Decryption Attacks 00:07:48 Duration
Lecture 19 File Encryption 00:04:13 Duration
Lecture 20 Mandatory Key Disclosure & Plausible Deniability 00:07:35 Duration
Lecture 21 Nesting Crypto Systems & Obfuscation 00:03:21 Duration
Lecture 22 Case Studies in Disk Decryption 00:02:46 Duration

Section 4 : Anti-Virus and End-Point-Protection

Lecture 1 Goals and Learning Objectives 00:00:38 Duration
Lecture 2 Is Anti-Virus dead - The Threat Landscape 00:03:55 Duration
Lecture 3 Is Anti-Virus dead - Protection Methods 00:10:53 Duration
Lecture 4 Ransomware 00:04:17 Duration
Lecture 5 Anti-Virus and End-Point-Protection Testing 00:05:40 Duration
Lecture 6 The Problem With AV and EPP Testing 00:03:38 Duration
Lecture 7 The Best of Business End-Point-Protection (EPP) 00:04:05 Duration
Lecture 8 Windows - The Best of Anti-Virus and End-Point-Protection 00:04:05 Duration
Lecture 9 Business End Point Protection (EPP) 00:02:24 Duration
Lecture 10 Mac - XProtect 00:02:51 Duration
Lecture 11 Mac - The Best of Anti-Virus and End-Point-Protection 00:02:35 Duration
Lecture 12 Linux - The Best of Anti-Virus and End-Point-Protection 00:02:41 Duration
Lecture 13 Online and Second Opinion - Anti-Virus and End-Point-Protection 00:03:12 Duration
Lecture 14 Is Anti-Virus and End-Point-Protection Dangerous 00:06:35 Duration

Section 5 : Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)

Lecture 1 Goals and Learning Objectives 00:00:34 Duration
Lecture 2 Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) 00:05:00 Duration
Lecture 3 End Point Detection and Response (EDR) 00:06:39 Duration
Lecture 4 End-Point-Protection How it works together in layers 00:06:57 Duration

Section 6 : End-Point-Protection Technology

Lecture 1 Goals and Learning Objectives 00:00:40 Duration
Lecture 2 What is application and execution control 00:09:49 Duration
Lecture 3 Windows - Application control - ACLs, Windows Permission Identifier & Accessenum 00:05:42 Duration
Lecture 4 Windows - Application control - User Account Control (UAC) 00:04:18 Duration
Lecture 5 Windows - Application control - Software Restriction Policies 00:04:34 Duration
Lecture 6 Windows - Application control - AppLocker 00:10:24 Duration
Lecture 7 Windows - Application Control - Parental controls
Lecture 8 Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks 00:06:35 Duration
Lecture 9 Windows - Exploitation Prevention - EMET 00:12:59 Duration
Lecture 10 Windows - Exploitation Prevention - Traps, MBEA and HMPA 00:04:49 Duration
Lecture 11 Windows 10 - Device Guard 00:11:33 Duration
Lecture 12 Windows - Defender Application Guard for Microsoft Edge 00:02:22 Duration
Lecture 13 Linux - Access Control Models 00:07:45 Duration
Lecture 14 Linux - Security frameworks - AppArmor 00:02:14 Duration
Lecture 15 Linux - Security frameworks - SElinux 00:03:19 Duration
Lecture 16 Linux - Security frameworks - Grsecurity 00:03:59 Duration
Lecture 17 Linux - Security frameworks - PaX and more 00:01:40 Duration
Lecture 18 Linux & Mac - File permissions, POSIX and ACLs 00:08:03 Duration
Lecture 19 Mac - Application control - Parental controls 00:03:04 Duration
Lecture 20 Mac - Application control - Gatekeeper
Lecture 21 Mac - Application control - System Integrity Protection 00:05:42 Duration
Lecture 22 Mac - Application control - Santa 00:03:48 Duration
Lecture 23 Mac - Application control - Xfence (Previously Little Flocker) 00:07:18 Duration
Lecture 24 Mac - Other Stuff! 00:01:19 Duration
Lecture 25 The New Normal For End-Point-Protection Technology 00:07:50 Duration
Lecture 26 Cylance 00:04:46 Duration

Section 7 : Threat Detection and Monitoring

Lecture 1 Goals and Learning Objectives 00:00:48 Duration
Lecture 2 A Complete Failure to Detect Threats 00:05:21 Duration
Lecture 3 Rethinking Honeypots 00:04:37 Duration
Lecture 4 CanaryTokens 00:18:46 Duration
Lecture 5 OpenCanary 00:12:20 Duration
Lecture 6 Artillery - Binary Defense 00:03:32 Duration
Lecture 7 Honey Drive 00:01:13 Duration
Lecture 8 Intrusion Detection Systems (IDS) Part 1 - Methods 00:07:11 Duration
Lecture 9 Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n 00:04:55 Duration
Lecture 10 Host-Based Intrusion Detection - OSSEC 00:04:40 Duration
Lecture 11 Network Analysis - Sguil, Xplico & NetworkMiner 00:03:05 Duration
Lecture 12 File Integrity Monitoring (FIM) and Checking Part 1 00:02:58 Duration
Lecture 13 File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe 00:02:31 Duration
Lecture 14 Network Security Toolkit (NST) 00:02:04 Duration
Lecture 15 Security Onion 00:01:17 Duration
Lecture 16 Security Information and Event Management Software (SIEM) 00:02:51 Duration

Section 8 : Malware and Hacker Hunting on the End-Point

Lecture 1 Goals and Learning Objectives 00:00:49 Duration
Lecture 2 Introduction to Malware and Hacker Hunting 00:08:21 Duration
Lecture 3 Windows - Farbar Recovery Scanner 00:09:20 Duration
Lecture 4 Automated Malware Removal Tools 00:10:41 Duration
Lecture 5 Live Rescue Operating Systems, CDs, and USBs 00:06:42 Duration
Lecture 6 Windows - Malware Seek & Destroy - Process Explorer - Part 1 00:11:33 Duration
Lecture 7 Windows - Malware Seek & Destroy - Process Explorer - Part 2 00:10:04 Duration
Lecture 8 Windows - Malware Seek & Destroy - Process Tools 00:02:09 Duration
Lecture 9 Windows - Malware Seek & Destroy - Sigcheck 00:02:31 Duration
Lecture 10 Windows - Malware Seek & Destroy - Autoruns 00:10:09 Duration
Lecture 11 Windows - Malware Seek & Destroy - Process Monitor 00:10:48 Duration
Lecture 12 Windows - Malware Seek & Destroy - Network Connections 00:08:11 Duration
Lecture 13 Malware Seek & Destroy - Networkx
Lecture 14 Linux - Malware Seek & Destroy - Sysdig 00:10:27 Duration
Lecture 15 Linux - Seek & Destroy Malware and Hackers - Csysdig 00:11:13 Duration
Lecture 16 Linux - Seek & Destroy Malware and Hackers - debsums & unhide 00:01:53 Duration
Lecture 17 Linux & Mac OS X - Malware Seek & Destroy - netstat 00:07:14 Duration
Lecture 18 Linux & Mac OS X - Malware Seek & Destroy - lsof 00:08:15 Duration
Lecture 19 Linux - Malware Seek & Destroy - rkhunter 00:06:13 Duration
Lecture 20 Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD 00:02:00 Duration
Lecture 21 Linux - Malware Seek & Destroy - Linux - Persistence Part 1 00:03:23 Duration
Lecture 22 Linux - Malware Seek & Destroy - Linux - Persistence Part 2 00:10:18 Duration
Lecture 23 Linux - Malware Seek & Destroy - Linux - Persistence Part 3 00:02:56 Duration
Lecture 24 Mac - Malware Seek & Destroy - Task Explorer 00:05:22 Duration
Lecture 25 Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer 00:07:26 Duration
Lecture 26 Mac, Linux & Windows - OSquery 00:14:48 Duration
Lecture 27 Firmware Rootkits – Seek and Destroy Part 1 00:07:28 Duration
Lecture 28 Firmware Rootkits – Seek and Destroy Part 2 00:04:05 Duration
Lecture 29 End-Point-Protection Recovery and Remediation Technology 00:03:17 Duration
Lecture 30 Encrypted Backup and Cloud Storage 00:06:04 Duration

Section 9 : Operating System and Application Hardening

Lecture 1 Goals and Learning Objectives 00:00:48 Duration
Lecture 2 An Introduction to Hardening 00:05:28 Duration
Lecture 3 Hardening Standards 00:10:01 Duration
Lecture 4 OpenSCAP 00:12:46 Duration
Lecture 5 Baseline Auditing 00:03:32 Duration
Lecture 6 Windows - Hardening 00:01:54 Duration
Lecture 7 Windows - Security Compliance Manager (SCM) 00:11:02 Duration
Lecture 8 Mac – Hardening 00:01:36 Duration
Lecture 9 Linux – Hardening 00:03:31 Duration
Lecture 10 Security Focused Operating Systems 00:04:50 Duration
Lecture 11 Monitoring for Security Drift 00:01:16 Duration

Section 10 : Secure Deleting, Evidence Elimination and Anti-Forensics

Lecture 1 Goals and Learning Objectives 00:00:43 Duration
Lecture 2 Secure File Deletion - Mechanical drives 00:08:11 Duration
Lecture 3 Secure File Deletion - Solid Sate Drives 00:06:37 Duration
Lecture 4 Evidence Elimination & Anti-Forensics - An Introduction 00:04:42 Duration
Lecture 5 Evidence Elimination - CCleaner and Bleachit 00:07:03 Duration
Lecture 6 Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer 00:05:50 Duration
Lecture 7 Disk Wiping - Mechanical Drives 00:05:46 Duration
Lecture 8 Disk Wiping - Solid State Drives (SSD) 00:10:54 Duration
Lecture 9 Scrubbing EXIF & Metadata Part 1 - Introduction 00:06:56 Duration
Lecture 10 Scrubbing EXIF & Metadata Part 2 - Tools 00:05:14 Duration
Lecture 11 Scrubbing EXIF & Metadata Part 3 - Guidance 00:04:37 Duration
Lecture 12 Sensor Noise Camera Identification 00:04:06 Duration

Section 11 : Email Security, Privacy and Anonymity

Lecture 1 Goals and Learning Objectives 00:01:05 Duration
Lecture 2 Clients, Protocols and Authentication 00:13:17 Duration
Lecture 3 Email Weaknesses 00:13:02 Duration
Lecture 4 PGP, GPG & Privacy 00:05:50 Duration
Lecture 5 PGP & GPG Clients 00:06:28 Duration
Lecture 6 Windows - PGP & GPG 00:19:53 Duration
Lecture 7 Tail - PGP & GPG 00:04:01 Duration
Lecture 8 PGP & GPG Weaknesses 00:06:15 Duration
Lecture 9 Improving OpenPGP Security - Best Practices - Part 1 00:02:32 Duration
Lecture 10 Improving OpenPGP Security - Primary and Subkeys - Part 2 00:12:21 Duration
Lecture 11 Improving OpenPGP Security - SmartcardsYubikey - Part 3 00:07:42 Duration
Lecture 12 Email Tracking & Exploits 00:10:33 Duration
Lecture 13 Email Anonymity & Pseudonymity 00:06:18 Duration
Lecture 14 TorBirdy 00:07:36 Duration
Lecture 15 Remailers 00:07:34 Duration
Lecture 16 Choosing an Email Provider 00:13:47 Duration
Lecture 17 Email Alternatives 00:03:17 Duration

Section 12 : Messengers - Security, Privacy and Anonymity

Lecture 1 Goals and Learning Objectives 00:00:20 Duration
Lecture 2 An Introduction to Instant Messengers 00:03:09 Duration
Lecture 3 Instant Messenger - Signal 00:02:31 Duration
Lecture 4 Instant Messengers - Chatsecure 00:01:39 Duration
Lecture 5 Instant Messengers - Cryptocat 00:00:45 Duration
Lecture 6 Instant Messengers - Ricochet 00:00:46 Duration
Lecture 7 Instant Messengers - Other 00:00:38 Duration
Lecture 8 Video and Voice Messengers - Linphone 00:04:29 Duration
Lecture 9 Video and Voice Messengers - Jitsi 00:01:40 Duration
Lecture 10 Video and Voice Messengers - Other 00:00:57 Duration

Section 13 : Wrap Up

Lecture 1 About Proctor Testing
Lecture 2 Remove - INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 3 Qubes OS 00:19:08 Duration
Lecture 4 Effective Network Isolation 00:12:28 Duration
Lecture 5 Socks5 proxy tunneling 00:10:20 Duration