Section 1 : Introduction

Lecture 1 Introduction 10:42
Lecture 2 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 3 About Proctor Testing Pdf
Lecture 4 Wireshark Installation Windows 5:51
Lecture 5 Wireshark Installation Mac OS 3:6

Section 2 : Wireshark Basics

Lecture 6 The best way to learn! 2:9
Lecture 7 Capture frames packets segments 15:11
Lecture 8 Why are no packets captured 9:30
Lecture 9 Port SPAN Mirroring 5:45

Section 3 : OSI Model

Lecture 10 About Certification Pdf
Lecture 11 OSI Model - Part 1 - OSI Model Introduction 2:0
Lecture 12 OSI Model - Part 2 - OSI Model Layers 4:7
Lecture 13 OSI Model - Part 3 - Split of concentration 6:27
Lecture 14 OSI Model - Part 4 - Layer 7 Application Layer 2:42
Lecture 15 OSI Model - Part 5 - Layer 6 Presentation Layer 2:6
Lecture 16 OSI Model - Part 6 - Layer 5 Session Layer 1:23
Lecture 17 OSI Model - Part 7 - Top layers versus lower layers 0:23
Lecture 18 OSI Model - Part 8 - Transport Layer 4:53
Lecture 19 OSI Model - Part 9 - Network Layer 2:59
Lecture 20 OSI Model - Part 10 - Data Link Layer 3:26
Lecture 21 OSI Model - Part 11 - Physical Layer 4:30
Lecture 22 OSI Model - Part 12 - Host Communication 3:37
Lecture 23 OSI Model - Part 13 - Encapsulation 2:52
Lecture 24 OSI Model - Part 14 - TCPIP versus OSI Model 6:12

Section 4 : Wireshark Filters

Lecture 25 Wireshark Display filters 2:45
Lecture 26 Practical Demonstration of Wireshark Display filters 10:49
Lecture 27 Two types of filters 1:35
Lecture 28 Wireshark Capture Filters 4:52
Lecture 29 Wireshark Filters IP address protocols 8:27

Section 5 : Wireshark Hacking Passwords

Lecture 30 Telnet Password & Data Captures 9:0
Lecture 31 TFTP Password & Data Capture 3:6
Lecture 32 FTP Password & Data Capture 1:38
Lecture 33 HTTP Data Capture 4:58
Lecture 34 Cisco router HTTP Password Capture 7:50

Section 6 : Hacking VoIP

Lecture 35 Replay Voice over IP calls (Virtual IP Phones) 15:57
Lecture 36 Capture and replay voice calls (Virtual & Physical IP Phones) 6:47

Section 7 : Protocol Analysis Can you troubleshoot the network

Lecture 37 DTP Lab Quiz 0:52
Lecture 38 DTP Lab Answers 8:57
Lecture 39 CDP, LLDP Lab Quiz 1:57
Lecture 40 CDP, LLDP Lab Answers 8:33
Lecture 41 OSPF Lab Quiz 2:36
Lecture 42 OSPF Lab Answers Part 1 14:8
Lecture 43 OSPF Lab Answers Part 2 2:5
Lecture 44 OSPF Troubleshooting Lab 1 Question 1:53
Lecture 45 OSPF Troubleshooting Lab 1 Answers 11:28
Lecture 46 OSPF Troubleshooting Lab 2 Question 1:44
Lecture 47 OSPF Troubleshooting Lab 2 Answers 5:31
Lecture 48 OSPF Troubleshooting Lab 3 Question 1:25
Lecture 49 OSPF Troubleshooting Lab 3 Answers
Lecture 50 EIGRP Lab Questions 1:23
Lecture 51 EIGRP Lab Answers 8:8
Lecture 52 EIGRP Troubleshooting Lab 1 Question 1:15
Lecture 53 EIGRP Troubleshooting Lab 1 Answers 5:10
Lecture 54 EIGRP Troubleshooting Lab 2 Question 0:59
Lecture 55 EIGRP Troubleshooting Lab 2 Answers 3:10
Lecture 56 BGP Lab Question 1:20
Lecture 57 BGP Lab Answers 11:9
Lecture 58 BGP Troubleshooting Lab Question 1:4
Lecture 59 BGP Troubleshooting Lab Answers 7:16

Section 8 : Wireshark Tips and Tricks

Lecture 60 Quick Wireshark Filters 4:0
Lecture 61 Wireshark Profiles 7:44
Lecture 62 Wireshark Conversation Filters 1:42
Lecture 63 Wireshark Statistics 5:14
Lecture 64 Wireshark Protocol Hierarchy 5:48
Lecture 65 Wireshark Conversations and IO Graph 5:29
Lecture 66 Wireshark Flow Graph 4:48

Section 9 : tshark and Termshark

Lecture 67 Overview and tshark install and packet capture 5:50
Lecture 68 Termshark 5:56

Section 10 : Python Wireshark scripting

Lecture 69 tshark and Pyshark installation 5:10
Lecture 70 Basic Pyshark testing 9:26
Lecture 71 Pyshark script

Section 11 : Python Wireshark Password Captures

Lecture 72 Lab overview and setup 6:40
Lecture 73 iPython and interactive OSPF script 6:11
Lecture 74 OSPF Password Python script 6:34
Lecture 75 FTP Password Capture Python script 5:4
Lecture 76 Telnet Password Capture Python Script 5:18

Section 12 : Kali Linux Installation

Lecture 77 Import Kali Linux (Windows 10 VirtualBox)

Section 13 : Kali Linux Network Attack Demonstrations

Lecture 78 Network Overview 3:49
Lecture 79 DTP Attack Demo 4:21
Lecture 80 VTP Attack Demo Part 1 5:22
Lecture 81 VTP Attack Demo Part 2 9:4
Lecture 82 Spanning Tree Attack Demo 2:18
Lecture 83 About Proctor Testing Pdf

Section 14 : Kali Linux DHCP attacks and Man-in-the-middle attack

Lecture 84 Overview of lab 4:15
Lecture 85 DHCP Starvation attack 3:48
Lecture 86 Rogue DHCP Server; MITM attack, Wireshark 6:55

Section 15 : Wireshark Quiz Questions

Lecture 87 Don't worry!
Lecture 88 Wireshark Quiz 1
Lecture 89 Wireshark Quiz 1 Answers
Lecture 90 Wireshark Quiz 2
Lecture 91 Wireshark Quiz 2 Answers
Lecture 92 Wireshark Quiz 3
Lecture 93 Wireshark Quiz 3 Answers
Lecture 94 Wireshark Quiz 4
Lecture 95 Wireshark Quiz 4 Answers
Lecture 96 Wireshark Quiz 5
Lecture 97 Wireshark Quiz 5 Answers
Lecture 98 Wireshark Quiz 6
Lecture 99 Wireshark Quiz 6 Answers
Lecture 100 Wireshark Quiz 7
Lecture 101 Wireshark Quiz 7 Answers
Lecture 102 Wireshark Quiz 8
Lecture 103 Wireshark Quiz 8 Answers
Lecture 104 Wireshark Quiz 9
Lecture 105 Wireshark Quiz 9 Answers
Lecture 106 Wireshark Quiz 10
Lecture 107 Wireshark Quiz 10 Answers
Lecture 108 Wireshark Quiz 11
Lecture 109 Wireshark Quiz 11 Answers
Lecture 110 Wireshark Quiz 12
Lecture 111 Wireshark Quiz 12 Answers
Lecture 112 Wireshark Quiz 13
Lecture 113 Wireshark Quiz 13 Answers
Lecture 114 Wireshark Quiz 14
Lecture 115 Wireshark Quiz 14 Answers
Lecture 116 Wireshark Quiz 15
Lecture 117 Wireshark Quiz 15 Answers
Lecture 118 Wireshark Quiz 16
Lecture 119 Wireshark Quiz 16 Answers
Lecture 120 Wireshark Quiz 17
Lecture 121 Wireshark Quiz 17 Answers
Lecture 122 Wireshark Quiz 18
Lecture 123 Wireshark Quiz 18 Answers
Lecture 124 Wireshark Quiz 19
Lecture 125 Wireshark Quiz 19 Answers
Lecture 126 Wireshark Quiz 20
Lecture 127 Wireshark Quiz 20 Answers
Lecture 128 Wireshark Quiz 21
Lecture 129 Wireshark Quiz 21 Answers
Lecture 130 Wireshark Quiz 22
Lecture 131 Wireshark Quiz 22 Answers
Lecture 132 Wireshark Quiz 23
Lecture 133 Wireshark Quiz 23 Answers

Section 16 : VTP Theory and demonstrations

Lecture 134 Make a choice Text
Lecture 135 VTP Overview 5:27
Lecture 136 VTP Overview Part 2 5:17
Lecture 137 VTP Modes 6:13
Lecture 138 VTP Versions 1:22
Lecture 139 VTP on real 3750 switch 6:5
Lecture 140 VTP - Demo Erase switch config
Lecture 141 VTP Pruning 4:29
Lecture 142 VTP Defaults 0:46
Lecture 143 VTP Warnings! 2:0
Lecture 144 VTP Demo Overview & Switch 1 config 6:43
Lecture 145 VTP Demo Autonegotiation S2 4:45
Lecture 146 VTP Demo VTP Client 6:51
Lecture 147 VTP Demo Client overrides server 8:42
Lecture 148 VTP Network Meltdown! VLANs removed from database! 8:29
Lecture 149 VTP Demo Network Back Again and Transparent Mode 2:40
Lecture 150 VTP Physical swtiches auto learn VTP domain 4:46

Section 17 : Spanning Tree theory and demonstrations

Lecture 151 Spanning Tree Overview 2:5
Lecture 152 Versions of Spanning Tree 4:7
Lecture 153 Why is Spanning Tree Required 7:27
Lecture 154 BPDUs and Bridge IDs 2:38
Lecture 155 Demo STP Root 7:37
Lecture 156 Root Ports and Designated Ports 8:25
Lecture 157 Extended Bridge ID 4:17
Lecture 158 PortFast 2:35
Lecture 159 Path Cost Part 1 1:43
Lecture 160 Path Cost Part 2 5:30
Lecture 161 Path Cost Part 3 4:22
Lecture 162 PVST versus RPVST Port States 8:23
Lecture 163 RPVST and PVST Interoperability and 802 2:36
Lecture 164 802 3:3
Lecture 165 802 7:10
Lecture 166 Demo 802 7:20
Lecture 167 802 3:7
Lecture 168 802 6:18
Lecture 169 802 6:23
Lecture 170 Spanning Tree Comparison Summary 3:35

Section 18 : Port SPAN (Mirroring) theory and demonstrations

Lecture 171 SPAN Introduction 1:11
Lecture 172 SPAN network overview 1:57
Lecture 173 Tests before SPAN 6:28
Lecture 174 Configure SPAN 8:28
Lecture 175 SPAN Ingress Options 3:40
Lecture 176 SPAN Options 6:14
Lecture 177 SPAN - Multiple Sessions 3:25

Section 19 : BGP theory and demonstrations

Lecture 178 BGP and the CCNA 1:28
Lecture 179 BGP Overview 2:57
Lecture 180 BGP Looking Glass 5:48
Lecture 181 GNS3 BGP Part 1 3:5
Lecture 182 GNS3 BGP Part 2 8:29
Lecture 183 GNS3 BGP Part 3 9:35
Lecture 184 GNS3 BGP Part 4 7:55
Lecture 185 GNS3 BGP Part 5 3:44
Lecture 186 GNS3 BGP Part 6 11:4
Lecture 187 GNS3 BGP Part 7 8:19
Lecture 188 GNS3 BGP Part 8 4:28
Lecture 189 GNS3 BGP Part 9 7:11
Lecture 190 GNS3 BGP Part 10 3:49

Section 20 : Dynamic Trunk Protocol - DTP

Lecture 191 DTP Theory 2:8
Lecture 192 DTP GNS3 Demo Part 1 7:10
Lecture 193 DTP GNS3 Demo Part 2 3:38
Lecture 194 DTP GNS3 Demo Part 3 7:33
Lecture 195 CCNA Dynamic Trunking Protocol (DTP) Quiz 28:7

Section 21 : CDP Overview

Lecture 196 CDP Introduction 9:44
Lecture 197 CDP Demo 6:17

Section 22 : GNS3 Campus 1 CDP and LLDP

Lecture 198 CDP Demo Basic discovery 7:28
Lecture 199 CDP Demo Disable globally and per interface 6:50
Lecture 200 CDP Demo Command Options 4:21
Lecture 201 LLDP Demo Discover Linux Servers 6:41

Section 23 : Port Security

Lecture 202 Port Security Overview
Lecture 203 Port Security and security mechanisms 1:23
Lecture 204 MAC addresses Port Security Static, Dynamic, Sticky 3:11
Lecture 205 Port Security Demo Part 1 9:3
Lecture 206 Port Security Demo Part 2 9:19
Lecture 207 Port Security Demo Sticky 2:53
Lecture 208 Port Security Error disable and auto recovery 5:14