Section 1 : Introduction
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM |
Section 2 : Domain 1 - Identification, Authentication, Authorization & Accounting (IAAA)
|
Lecture 1 | Domain 1 - Introduction and Summary | 00:01:20 Duration |
|
Lecture 2 | CIA Principles | 00:04:50 Duration |
|
Lecture 3 | IAAA operation | 00:03:31 Duration |
|
Lecture 4 | Some Important Security Concepts | |
|
Lecture 5 | Kerberos | 00:04:20 Duration |
|
Lecture 6 | Identity federation & SSO | 00:04:24 Duration |
|
Lecture 7 | Web Services Federation and OAuth | 00:01:00 Duration |
|
Lecture 8 | Authentication Factors | 00:03:31 Duration |
|
Lecture 9 | Biometrics | 00:04:04 Duration |
|
Lecture 10 | Optional - Lab 1-1 | 00:04:28 Duration |
|
Lecture 11 | Optional - Lab 1-2 | 00:06:28 Duration |
|
Lecture 12 | Optional - Lab 1-3 | 00:04:13 Duration |
|
Lecture 13 | Optional - Lab 1-4 | 00:06:12 Duration |
|
Lecture 14 | Optional - Lab 1-5 |
Section 3 : Domain 2 - Privileged Account Management (PAM)
|
Lecture 1 | Domain 2 Privileged Access Management | 00:01:24 Duration |
|
Lecture 2 | Privileged Accounts | 00:03:06 Duration |
|
Lecture 3 | Privileged Account and Session Management | 00:03:23 Duration |
|
Lecture 4 | Privileged Account Monitoring | 00:01:54 Duration |
|
Lecture 5 | Privileged Account Management Solutions | 00:03:52 Duration |
|
Lecture 6 | Application Whitelisting | 00:01:41 Duration |
|
Lecture 7 | Optional - Lab 2-1 | 00:12:55 Duration |
|
Lecture 8 | Optional - Lab 2-2 | 00:06:13 Duration |
Section 4 : Section 4 - Identity Governance and Administration (IGA)
|
Lecture 1 | Domain 3 Identity Governance and Administration (IGA) | |
|
Lecture 2 | User Onboarding | 00:02:25 Duration |
|
Lecture 3 | User Termination & Role changes | 00:03:11 Duration |
|
Lecture 4 | Access Controls & RBAC | 00:02:28 Duration |
|
Lecture 5 | Access validation & Certification | 00:02:21 Duration |
|
Lecture 6 | Segregation of Duties, Auditing and Reporting | 00:03:42 Duration |
|
Lecture 7 | Identity Lifecycle Management (ILM) | 00:03:01 Duration |
|
Lecture 8 | System for Cross-domain Identity Management | 00:00:49 Duration |
|
Lecture 9 | Optional - Lab 3-1 | 00:05:57 Duration |
|
Lecture 10 | Optional - Lab 3-2 | 00:06:40 Duration |
|
Lecture 11 | Optional - Lab 3-3 | 00:04:16 Duration |
Section 5 : Section 5 - Data Governance and Protection
|
Lecture 1 | Domain 4 - Data Governance and Protection | 00:01:04 Duration |
|
Lecture 2 | Data Types | 00:02:40 Duration |
|
Lecture 3 | Intellectual property | 00:01:46 Duration |
|
Lecture 4 | Data Classification | 00:01:37 Duration |
|
Lecture 5 | Industry and local laws and regulations | 00:02:30 Duration |
|
Lecture 6 | Data Type Management & Monitoring | 00:03:21 Duration |
|
Lecture 7 | Security Policy Framework | |
|
Lecture 8 | Data Breach and Incident Response Process | 00:02:43 Duration |
|
Lecture 9 | Notifiable Data Breaches | 00:01:01 Duration |
|
Lecture 10 | Optional - Lab 4-1 | 00:05:40 Duration |
|
Lecture 11 | Optional - Lab 4-2 | |
|
Lecture 12 | Optional - Lab 4-3 | 00:04:05 Duration |
|
Lecture 13 | Optional - Lab 4-4 | 00:02:04 Duration |