Section 1 : Introduction

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 2 : Domain 1 - Identification, Authentication, Authorization & Accounting (IAAA)

Lecture 2 Domain 1 - Introduction and Summary 1:20
Lecture 3 CIA Principles 4:50
Lecture 4 IAAA operation 3:31
Lecture 5 Some Important Security Concepts
Lecture 6 Kerberos 4:20
Lecture 7 Identity federation & SSO 4:24
Lecture 8 Web Services Federation and OAuth 1:0
Lecture 9 Authentication Factors 3:31
Lecture 10 Biometrics 4:4
Lecture 11 Optional - Lab 1-1 4:28
Lecture 12 Optional - Lab 1-2 6:28
Lecture 13 Optional - Lab 1-3 4:13
Lecture 14 Optional - Lab 1-4 6:12
Lecture 15 Optional - Lab 1-5

Section 3 : Domain 2 - Privileged Account Management (PAM)

Lecture 16 Domain 2 Privileged Access Management 1:24
Lecture 17 Privileged Accounts 3:6
Lecture 18 Privileged Account and Session Management 3:23
Lecture 19 Privileged Account Monitoring 1:54
Lecture 20 Privileged Account Management Solutions 3:52
Lecture 21 Application Whitelisting 1:41
Lecture 22 Optional - Lab 2-1 12:55
Lecture 23 Optional - Lab 2-2 6:13

Section 4 : Section 4 - Identity Governance and Administration (IGA)

Lecture 24 Domain 3 Identity Governance and Administration (IGA)
Lecture 25 User Onboarding 2:25
Lecture 26 User Termination & Role changes 3:11
Lecture 27 Access Controls & RBAC 2:28
Lecture 28 Access validation & Certification 2:21
Lecture 29 Segregation of Duties, Auditing and Reporting 3:42
Lecture 30 Identity Lifecycle Management (ILM) 3:1
Lecture 31 System for Cross-domain Identity Management 0:49
Lecture 32 Optional - Lab 3-1 5:57
Lecture 33 Optional - Lab 3-2 6:40
Lecture 34 Optional - Lab 3-3 4:16

Section 5 : Section 5 - Data Governance and Protection

Lecture 35 Domain 4 - Data Governance and Protection 1:4
Lecture 36 Data Types 2:40
Lecture 37 Intellectual property 1:46
Lecture 38 Data Classification 1:37
Lecture 39 Industry and local laws and regulations 2:30
Lecture 40 Data Type Management & Monitoring 3:21
Lecture 41 Security Policy Framework
Lecture 42 Data Breach and Incident Response Process 2:43
Lecture 43 Notifiable Data Breaches 1:1
Lecture 44 Optional - Lab 4-1 5:40
Lecture 45 Optional - Lab 4-2
Lecture 46 Optional - Lab 4-3 4:5
Lecture 47 Optional - Lab 4-4 2:4