Section 1 : Course Introduction

Lecture 1 Welcome to the Course! (Updated 2021 Lecture) 0:48
Lecture 2 What This Course Is & What It Isn't (Updated 2021 Lecture) 2:49
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 4 About Certification Pdf
Lecture 5 About Proctor Testing Pdf
Lecture 6 Remove - INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 7 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 8 About Certification Pdf
Lecture 9 About Proctor Testing Pdf
Lecture 10 Student Exercise Introduce Yourself Text

Section 2 : Getting Started in Information Security (Updated 2021 Section)

Lecture 11 mp4 6:6
Lecture 12 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 13 About Certification Pdf

Section 3 : Core Information Security Principles (Updated 2021 Section)

Lecture 14 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 15 The CIA Triad (Updated 2021 Lecture) 4:5
Lecture 16 Authentication, Authorization, and Accounting (AAA) (Updated 2021 Lecture) 3:10
Lecture 17 Defense in Depth (Updated 2021 Lecture) 3:49
Lecture 18 Least Privilege (Updated 2021 Lecture) 1:57
Lecture 19 Non-Repudiation (New 2021 Lecture) 3:17
Lecture 20 Implicit Deny (New 2021 Lecture) 2:50
Lecture 21 Legal and Regulatory Issues (Updated 2021 Lecture) 7:21
Lecture 22 Information Security Governance (Updated 2021 Lecture) 8:6
Lecture 23 Authentication Basics (Updated 2021 Lecture) 10:44
Lecture 24 Identify Proofing (Updated 2021 Lecture) 3:8
Lecture 25 General Password Rules (Updated 2021 Lecture) 8:57

Section 4 : Risk Management (Updated 2021 Section)

Lecture 26 Section Introduction (Updated 2021 Lecture) 1:5
Lecture 27 Introduction to Risk Management (Updated 2021 Lecture) 18:4
Lecture 28 Exploring Risks and Threats (Updated 2021 Lecture) 6:42
Lecture 29 Quantitative Risk Analysis (Updated 2021 Lecture) 8:13
Lecture 30 Attack Surface Analysis (Updated 2021 Lecture) 8:28

Section 5 : Asset Management (Updated 2021 Section)

Lecture 31 Section Introduction (Updated 2021 Lecture) 0:57
Lecture 32 Identifying and Classifying Assets (Updated 2021 Lecture) 5:10
Lecture 33 Understanding the Asset Lifecycle (Updated 2021 Lecture) 6:2
Lecture 34 Data Retention (Updated 2021 Lecture) 3:47
Lecture 35 Understanding Data States (Updated 2021 Lecture) 3:26

Section 6 : Access Control (Updated 2021 Section)

Lecture 36 Section Introduction (Updated 2021 Lecture) 0:52
Lecture 37 Access Control (Updated 2021 Lecture) 13:43
Lecture 38 Physical and Logical Access Controls (Updated 2021 Lecture) 17:38
Lecture 39 Access Control Models (Updated 2021 Lecture) 11:30
Lecture 40 Student Activity Analyzing Your Organization's 2:6

Section 7 : Security Malware Threats (Updated 2021 Section)

Lecture 41 Section Introduction (Updated 2021 Lecture) 1:3
Lecture 42 Buffer Overflows (Updated 2021 Lecture) 5:8
Lecture 43 Viruses and Polymorphic Viruses (Updated 2021 Lecture) 5:50
Lecture 44 Worms (Updated 2021 Lecture)
Lecture 45 Trojan Horses (Updated 2021 Lecture) 1:46
Lecture 46 Logic Bombs (Updated 2021 Lecture) 2:21
Lecture 47 Spyware and Adware (Updated 2021 Lecture) 3:11
Lecture 48 Ransomware (Updated 2021 Lecture) 4:41
Lecture 49 Rootkits (Updated 2021 Lecture) 3:28
Lecture 50 Zero Day Attacks (Updated 2021 Lecture) 2:10
Lecture 51 Protecting Against Malware (Updated 2021 Lecture) 6:36

Section 8 : Additional Threats & Vulnerabilities (Updated 2021 Section)

Lecture 52 Section Introduction (Updated 2021 Lecture) 0:37
Lecture 53 Social Engineering (Updated 2021 Lecture) 12:5
Lecture 54 Social Engineering Phone Impersonation Scenarios Overview (New 2021 Lecture) 0:29
Lecture 55 Social Engineering Phone Call Impersonation Example #1 (New 2021 Lecture) 1:22
Lecture 56 Social Engineering Phone Call Impersonation Example #2 (New 2021 Lecture)
Lecture 57 Social Engineering Phone Call Impersonation Example #3 (New 2021 Lecture) 0:43
Lecture 58 Social Engineering Phone Impersonation Scenarios Discussion 3:39
Lecture 59 Email Spam, Spoofing, Phishing, and Pharming (Updated 2021 Lecture) 12:55
Lecture 60 Protocol Spoofing (Updated 2021 Lecture) 9:5
Lecture 61 Common Attack Methods (Updated 2021 Lecture) 10:6
Lecture 62 Course Review Request 0:39

Section 9 : Network Segmentation & Isolation (Updated 2021 Section)

Lecture 63 Section Introduction (Updated 2021 Lecture) 1:39
Lecture 64 Introduction to Network Isolation (Updated 2021 Lecture) 1:52
Lecture 65 Demilitarized Zone (DMZ) (Updated 2021 Lecture) 5:28
Lecture 66 Basic Network Zones (Updated 2021 Lecture) 5:5
Lecture 67 Virtual LANs (VLANs) (Updated 2021 Lecture) 3:52
Lecture 68 Routers (Updated 2021 Lecture) 3:4
Lecture 69 Network Address Translation (NAT) (Updated 2021 Lecture) 7:54
Lecture 70 Access Control Lists (ACLs) (New 2021 Lecture) 4:28

Section 10 : Network Security (Updated 2021 Section)

Lecture 71 Section Introduction (Updated 2021 Lecture) 0:31
Lecture 72 Virtual Private Networks (Updated 2021 Lecture) 7:37
Lecture 73 Firewalls (Updated 2021 Lecture) 11:11
Lecture 74 Web Proxy Servers (Updated 2021 Lecture) 2:42
Lecture 75 Honeypots (Updated 2021 Lecture) 2:24
Lecture 76 Intrusion Detection & Prevention Systems (Updated 2021 Lecture) 2:54

Section 11 : Wireless Networking Security (Updated 2021 Section)

Lecture 77 Section Introduction (Updated 2021 Lecture) 0:52
Lecture 78 Wireless Encryption Standards (Updated 2021 Lecture) 2:15
Lecture 79 Wireless Equivalent Privacy (WEP) (Updated 2021 Lecture) 3:3
Lecture 80 Wi-Fi Protected Access (WPA) (Updated 2021 Lecture) 2:34
Lecture 81 Wi-Fi Protected Access 2 (WPA2) (Updated 2021 Lecture) 3:54
Lecture 82 Wi-Fi Protected Access 3 (WPA3) (Updated 2021 Lecture) 3:17
Lecture 83 WPA Enterprise vs 3:15
Lecture 84 Wireless Network Vulnerabilities & Security (New 2021 Lecture) 12:31
Lecture 85 Common Wireless Security Threats (Updated 2021 Lecture) 6:13

Section 12 : Security Assessments and Testing (Updated 2021 Section)

Lecture 86 Section Introduction (Updated 2021 Lecture) 1:1
Lecture 87 Vulnerability Assessments (Updated 2021 Lecture)
Lecture 88 Penetration Testing (Updated 2021 Lecture) 12:27
Lecture 89 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 90 Security Assessments (Updated 2021 Lecture)

Section 13 : Security Assessment Tools (Updated 2021 Section)

Lecture 91 Section Introduction (Updated 2021 Lecture) 1:23
Lecture 92 Wireshark Network Sniffing (Updated 2021 Lecture) 4:31
Lecture 93 Nmap Zenmap Network Scanner (Updated 2021 Lecture) 6:19
Lecture 94 Tenable Nessus Vulnerability Scanner (Updated 2021 Lecture) 4:39
Lecture 95 About Certification Pdf

Section 14 : Hardening End-User Systems and Servers (Updated 2021 Section)

Lecture 96 Section Introduction (Updated 2021 Lecture)
Lecture 97 Hardening End-User Systems (Updated 2021 Lecture) 7:46
Lecture 98 Hardening Servers (Updated 2021 Lecture) 3:51
Lecture 99 Patch and Change Management (Updated 2021 Lecture) 4:46
Lecture 100 Separation of Services (Updated 2021 Lecture) 3:4

Section 15 : Introduction to Cryptography (Updated 2021 Section)

Lecture 101 Section Introduction (Updated 2021 Lecture) 0:56
Lecture 102 Introduction to Cryptography (Updated 2021 Lecture) 5:32
Lecture 103 Symmetric Encryption (Updated 2021 Lecture) 8:47
Lecture 104 Asymmetric Encryption (Updated 2021 Lecture) 4:30
Lecture 105 Hashing Algorithms (Updated 2021 Lecture) 7:13
Lecture 106 Digital Certificates and Certificate Authorities (Updated 2021 Lecture) 8:6
Lecture 107 Email Encryption Use Cases (Updated 2021 Lecture) 12:17
Lecture 108 Windows Encrypted File System Use Case (Updated 2021 Lecture) 6:15
Lecture 109 Revisiting VPN (Updated 2021 Lecture) 5:13
Lecture 110 Software versus Hardware-Based Encryption (Updated 2021 Lecture) 4:15
Lecture 110 SW-vs-HW-Based-Encryption Pdf

Section 16 : Incident Response, Disaster Recovery & Business Continuity (Updated 2021 Section

Lecture 111 Section Introduction (Updated 2021 Lecture) 0:57
Lecture 112 Understanding Incidents and Disasters (Updated 2021 Lecture) 2:54
Lecture 113 Incident Response (Updated 2021 Lecture) 5:50
Lecture 114 Disaster Recovery and Business Continuity (Updated 2021 Lecture) 18:43

Section 17 : Application Development Security (New 2021 Section)

Lecture 115 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 116 Importance of IT Security in Application Development (New 2021 Lecture) 3:51
Lecture 117 Software Development Lifecycle (SDLC) (New 2021 Lecture) 14:8
Lecture 118 Static and Dynamic Testing (New 2021 Lecture) 2:58
Lecture 119 Authorization to Operate (ATO) (New 2021 Lecture) 3:48

Section 18 : Personnel Policies (Updated 2021 Section)

Lecture 120 Section Introduction (Updated 2021 Lecture) 1:0
Lecture 121 Acceptable Use (Updated 2021 Lecture) 2:17
Lecture 122 Code of Ethics (Updated 2021 Lecture) 3:22
Lecture 123 Mandatory Vacations (Updated 2021 Lecture) 2:39
Lecture 124 Separation of Duties (Updated 2021 Lecture) 4:5
Lecture 125 Job Rotation (Updated 2021 Lecture) 1:56
Lecture 126 Education and Training (Updated 2021 Lecture) 4:34

Section 19 : Class Mini-Case Scenarios (Updated 2021 Section)

Lecture 127 About Proctor Testing Pdf
Lecture 128 Class Mini-Case Scenario #1 Small Tax Accounting Office (Updated 2021) Text
Lecture 129 Class Mini-Case Scenario #2 Growing Marketing Business (Updated 2021) Text