Section 1 : Overview of Security

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 2 Download the Study Guide Text
Lecture 3 Overview of Security 2:56
Lecture 4 CIA Triad 3:55
Lecture 5 AAA of Security (OBJ 2 3:6
Lecture 6 Security Threats (OBJ 1 2:57
Lecture 7 Mitigating Threats (OBJ 5 2:46
Lecture 8 Hackers (OBJ 1 4:53
Lecture 9 Threat Actors (1 3:12
Lecture 10 Threat Intelligence and Sources (OBJ 1 8:52
Lecture 11 Threat Hunting (OBJ 1 6:51
Lecture 12 Attack Frameworks (OBJ 4 11:9

Section 2 : Malware

Lecture 13 Malware (OBJ 1 0:40
Lecture 14 Viruses (OBJ 1 6:21
Lecture 15 Worms (OBJ 1 2:10
Lecture 16 Trojans (OBJ 1 2:48
Lecture 17 Demo_ Viruses and Trojans (OBJ 1 6:15
Lecture 18 Ransomware (OBJ 1 2:30
Lecture 19 Spyware (OBJ 1 2:39
Lecture 20 Rootkits (OBJ 1 3:29
Lecture 21 Spam (OBJ 1 2:56
Lecture 22 Summary of Malware 2:2

Section 3 : Malware Infections

Lecture 23 Malware Infections 4:12
Lecture 24 Common Delivery Methods (OBJ 1 4:27
Lecture 25 About Certification Pdf
Lecture 26 Botnets and Zombies (OBJ 1 3:30
Lecture 27 Active Interception and Privilege Escalation (OBJ 1 2:28
Lecture 28 Demo_ Privilege Escalation (OBJ 1 5:41
Lecture 29 Backdoors and Logic Bombs (OBJ 1 3:48
Lecture 30 Symptoms of Infection (OBJ 1 4:10
Lecture 31 Removing Malware (OBJ 4 5:2
Lecture 32 Preventing Malware (OBJ 1 5:56
Lecture 33 Malware Exploitation (OBJ 1 7:36

Section 4 : Security Applications and Devices

Lecture 34 Security Applications and Devices 0:33
Lecture 35 Software Firewalls (OBJ 3 4:16
Lecture 36 Demo_ Software Firewalls (OBJ 3 6:44
Lecture 37 IDS (OBJ 3 5:2
Lecture 38 Pop-up Blockers (OBJ 1 3:9
Lecture 39 Data Loss Prevention (DLP) (OBJ 2 3:43
Lecture 40 Securing the BIOS (OBJ 3 3:56
Lecture 41 Securing Storage Devices (OBJ 2 3:26
Lecture 42 Disk Encryption (OBJ 2 4:51
Lecture 43 Endpoint Analysis (OBJ 3 5:44

Section 5 : Mobile Device Security

Lecture 44 Mobile Device Security (OBJ 1 1:14
Lecture 45 Securing Wireless Devices (OBJ 3 1:30
Lecture 46 Mobile Malware (OBJ 1 6:19
Lecture 47 SIM Cloning & ID Theft (OBJ 1 4:1
Lecture 48 Bluetooth Attacks (OBJ 1 2:8
Lecture 49 Mobile Device Theft (OBJ 3 3:10
Lecture 50 Security of Apps (OBJ 3 5:6
Lecture 51 BYOD (OBJ 3 4:57
Lecture 52 Hardening Mobile Devices (OBJ 3 3:52

Section 6 : Hardening

Lecture 53 Hardening (OBJ 3 1:48
Lecture 54 Unnecessary Applications (OBJ 1 3:11
Lecture 55 Restricting Applications (OBJ 3 2:56
Lecture 56 Demo_ Unnecessary Services (OBJ 3 5:35
Lecture 57 Trusted Operating System (OBJ 3 1:56
Lecture 58 Updates and Patches (OBJ 1 3:26
Lecture 59 Patch Management (OBJ 1 3:49
Lecture 60 Group Policies (OBJ 2 2:33
Lecture 61 Demo_ Group Policies (OBJ 3 4:6
Lecture 62 File Systems and Hard Drives (OBJ 2 3:18

Section 7 : Suppy Chain Management

Lecture 63 Supply Chain Assessment (OBJ 1 5:22
Lecture 64 Root of Trust (OBJ 3 4:33
Lecture 65 Trusted Firmware (OBJ 3 4:52
Lecture 66 Secure Processing (OBJ 3 3:59

Section 8 : Virtualization

Lecture 67 Virtualization (OBJ 2 2:7
Lecture 68 Hypervisors (OBJ 2 2:37
Lecture 69 Demo_ How to create a VM (OBJ 2 4:38
Lecture 70 Threats to VMs (OBJ 2 3:43
Lecture 71 Securing VMs (OBJ 2 3:47
Lecture 72 Demo_ Securing VMs 4:41

Section 9 : Application Security

Lecture 73 Application Security 1:43
Lecture 74 Web Browser Security (OBJ 3 6:39
Lecture 75 Web Browser Concerns (OBJ 3 3:19
Lecture 76 Demo_ Web Browser Configuration (OBJ 3 5:19
Lecture 77 Securing Applications (OBJ 1 4:38

Section 10 : Secure Software Development

Lecture 78 Software Development (OBJ 2 8:34
Lecture 79 SDLC Principles (OBJ 1 6:23
Lecture 80 Testing Methods (OBJ 2 6:59
Lecture 81 Software Vulnerabilities and Exploits (OBJ 1 3:44
Lecture 82 Buffer Overflows (OBJ 1 6:15
Lecture 83 Demo_ Buffer Overflow Attack (OBJ 1 6:25
Lecture 84 XSS and XSRF (OBJ 1 3:8
Lecture 85 SQL Injection (OBJ 1 6:25
Lecture 86 Demo_ SQL Injection (OBJ 1 7:13
Lecture 87 XML Vulnerabilities (OBJ 1 5:7
Lecture 88 Race Conditions (OBJ 1 5:47
Lecture 89 Design Vulnerabilities (OBJ 1 4:13

Section 11 : Network Design

Lecture 90 Network Security 0:44
Lecture 91 The OSI Model (OBJ 3 6:0
Lecture 92 Switches (OBJ 1 3:32
Lecture 93 Routers (OBJ 3 2:27
Lecture 94 Network Zones (OBJ 3 3:26
Lecture 95 Jumpbox (OBJ 3 5:1
Lecture 96 Network Access Control (OBJ 3 2:40
Lecture 97 VLANs (OBJ 3 1:30
Lecture 98 Subnetting (OBJ 3 1:51
Lecture 99 Network Address Translation (OBJ 3 2:32
Lecture 100 Telephony (OBJ 3 5:58

Section 12 : Perimeter Security

Lecture 101 Perimeter Security 0:47
Lecture 102 Firewalls (OBJ 3 8:1
Lecture 103 About Proctor Testing Pdf
Lecture 104 Proxy Servers (OBJ 3 4:12
Lecture 105 Honeypots and Honeynets (OBJ 2 1:22
Lecture 106 Data Loss Prevention (OBJ 2 1:35
Lecture 107 NIDS and NIPS (OBJ 3 4:11
Lecture 108 Unified Threat Management (OBJ 3 1:52

Section 13 : Cloud Security

Lecture 109 Cloud Computing (OBJ 1 3:29
Lecture 110 Cloud Types (OBJ 2 2:52
Lecture 111 As a Service (OBJ 2 7:4
Lecture 112 Cloud Security (OBJ 2 2:25
Lecture 113 Defending Servers (OBJ 1 4:32
Lecture 114 Cloud-based Infrastructure (OBJ 1 7:19
Lecture 115 CASB (OBJ 2 4:24
Lecture 116 API (OBJ 2 6:5
Lecture 117 FAAS and Serverless (OBJ 2 8:5
Lecture 118 Cloud Threats (OBJ 1 8:8

Section 14 : Automation

Lecture 119 Workflow Orchestration (OBJ 2 3:57
Lecture 120 CI_CD (OBJ 2 7:2
Lecture 121 DevSecOps (OBJ 2 4:47
Lecture 122 IAC (OBJ 2 4:19
Lecture 123 Machine Learning (OBJ 1 8:26

Section 15 : Network Attacks

Lecture 124 Network Attacks (OBJ 1 0:38
Lecture 125 Ports and Protocols (OBJ 3 4:24
Lecture 126 Memorization of Ports (OBJ 3 11:30
Lecture 127 Unnecessary Ports (OBJ 1 3:21
Lecture 128 Denial of Service (OBJ 1 7:56
Lecture 129 DDoS (OBJ 1 1:36
Lecture 130 Stopping a DDoS (OBJ 2 2:27
Lecture 131 Spoofing (OBJ 1 1:16
Lecture 132 Hijacking (OBJ 1 3:45
Lecture 133 Replay Attack (OBJ 1 1:27
Lecture 134 Demo_ Null Sessions (OBJ 1 2:24
Lecture 135 Transitive Attacks (OBJ 2 1:25
Lecture 136 DNS Attacks (OBJ 1 4:33
Lecture 137 ARP Poisoning (OBJ 1 1:30

Section 16 : Securing Networks

Lecture 138 Securing Networks (OBJ 3 0:49
Lecture 139 Securing Network Devices (OBJ 1 6:43
Lecture 140 Securing Network Media (OBJ 2 8:48
Lecture 141 Securing WiFi Devices (OBJ 1 4:22
Lecture 142 Wireless Encryption (OBJ 1 5:31
Lecture 143 Wireless Access Points (OBJ 1 6:12
Lecture 144 Wireless Attacks (OBJ 1 4:16
Lecture 145 Demo_ Wireless Attack (OBJ 1 7:39
Lecture 146 WPA3 (OBJ 3 6:5
Lecture 147 Other Wireless Technologies (OBJ 1 6:2

Section 17 : Physical Security

Lecture 148 Physical Security (OBJ 2 1:31
Lecture 149 Surveillance (OBJ 2 2:51
Lecture 150 Door Locks (OBJ 2 3:48
Lecture 151 Demo_ Lock Picking (OBJ 2 1:37
Lecture 152 Biometric Readers (OBJ 2 4:15

Section 18 : Facilities Security

Lecture 153 Facilities Security (OBJ 2 0:37
Lecture 154 Fire Suppression (OBJ 2 6:21
Lecture 155 HVAC (OBJ 2 2:23
Lecture 156 Shielding (OBJ 2 2:35
Lecture 157 Vehicular Vulnerabilities (OBJ 2 6:50
Lecture 158 IoT Vulnerabilities (OBJ 2 3:26
Lecture 159 Embedded System Vulnerabilities (OBJ 2 6:49
Lecture 160 ICS and SCADA Vulnerabilities (OBJ 2 8:16
Lecture 161 Mitigating Vulnerabilities (OBJ 2 3:27
Lecture 162 Premise System Vulnerabilities (OBJ 1 6:10

Section 19 : Authentication

Lecture 163 Authentication (OBJ 2 5:53
Lecture 164 Authentication Models (OBJ 2 5:19
Lecture 165 802 3:44
Lecture 166 LDAP and Kerberos (OBJ 3 2:26
Lecture 167 Remote Desktop Services (OBJ 3 1:51
Lecture 168 Remote Access Service (OBJ 3 2:3
Lecture 169 VPN (OBJ 3 3:2
Lecture 170 RADIUS vs TACACS+ (OBJ 3 2:18
Lecture 171 Authentication Summary (OBJ 3 2:4
Lecture 172 Authentication Attacks (OBJ 1 7:9

Section 20 : Access Control

Lecture 173 Access Control (OBJ 3 0:50
Lecture 174 Access Control Models (OBJ 3 8:14
Lecture 175 Best Practices (OBJ 2 5:43
Lecture 176 Users and Groups (OBJ 3 9:12
Lecture 177 Permissions (OBJ 3 3:41
Lecture 178 Usernames and Passwords (OBJ 1 2:36
Lecture 179 Demo_ Policies (OBJ 3 4:34
Lecture 180 User Account Control (OBJ 3 1:53

Section 21 : Risk Assessments

Lecture 181 Risk Assessments (OBJ 5 8:34
Lecture 182 Qualitative Risk (OBJ 5 4:6
Lecture 183 Quantitative Risk (OBJ 5 5:27
Lecture 184 Methodologies (OBJ 1 2:49
Lecture 185 Security Controls (OBJ 5 6:49
Lecture 186 Types of Risk (OBJ 1 7:10

Section 22 : Vulnerability Management

Lecture 187 Vulnerability Management (OBJ 1 7:50
Lecture 188 Penetration Testing (OBJ 1 4:27
Lecture 189 Training and Exercises (OBJ 1 4:46
Lecture 190 OVAL (OBJ 1 1:34
Lecture 191 Vulnerability Assessments (OBJ 1 6:52
Lecture 192 Demo_ Nmap Scanning (OBJ 4 8:50
Lecture 193 Demo_ Vulnerability Scanning (OBJ 1 9:33
Lecture 194 Password Analysis (OBJ 1 5:54
Lecture 195 Demo_ Password Cracking (OBJ 4 2:36

Section 23 : Monitoring and Auditing

Lecture 196 Monitoring Types (OBJ 3 2:54
Lecture 197 Performance Baselining (OBJ 2 4:35
Lecture 198 Protocol Analyzers (OBJ 3 2:58
Lecture 199 SNMP (OBJ 3 3:40
Lecture 200 Demo_ Analytical Tools (OBJ 4 4:27
Lecture 201 Auditing (OBJ 1 1:54
Lecture 202 Demo_ Auditing Files (OBJ 1 3:53
Lecture 203 Logging (OBJ 1 3:39
Lecture 204 Log Files (OBJ 4 5:14
Lecture 205 SIEM (OBJ 1 8:48
Lecture 206 Syslog (OBJ 1 5:49
Lecture 207 SOAR (OBJ 1 3:17

Section 24 : Cryptography

Lecture 208 Cryptography (OBJ 2 4:55
Lecture 209 Symmetric vs Asymmetric (OBJ 2 6:12
Lecture 210 Symmetric Algorithms (OBJ 2 4:56
Lecture 211 Public Key Cryptography (OBJ 2 3:9
Lecture 212 Asymmetric Algorithms (OBJ 2 3:44
Lecture 213 Pretty Good Privacy (OBJ 2 1:46
Lecture 214 Key Management (OBJ 2 2:11
Lecture 215 One-Time Pad (OBJ 2 4:19
Lecture 216 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 217 Cryptography Considerations (OBJ 2 12:23

Section 25 : Hashing

Lecture 218 Hashing (OBJ 1 8:28
Lecture 219 Demo_ Hashing (OBJ 2 3:3
Lecture 220 Hashing Attacks (OBJ 1 3:15
Lecture 221 Increasing Hash Security (OBJ 2 1:27

Section 26 : Public Key Infrastructure

Lecture 222 Public Key Infrastructure (OBJ 3 3:53
Lecture 223 Digital Certificates (OBJ 3 6:43
Lecture 224 About Certification Pdf
Lecture 225 Certificate Authorities (OBJ 3 4:13
Lecture 226 Web of Trust (OBJ 3 2:35

Section 27 : Security Protocols

Lecture 227 Security Protocols (OBJ 3 0:21
Lecture 228 S_MIME (OBJ 3 1:30
Lecture 229 SSL and TLS (OBJ 1 5:35
Lecture 230 SSH (OBJ 3 2:28
Lecture 231 VPN Protocols (OBJ 3 6:37
Lecture 232 About Proctor Testing Pdf

Section 28 : Planning for the Worst

Lecture 233 Planning for the Worst (OBJ 2 2:10
Lecture 234 Redundant Power (OBJ 2 3:8
Lecture 235 Backup Power (OBJ 2 3:6
Lecture 236 Data Redundancy (OBJ 2 4:39
Lecture 237 Demo_ RAIDs (OBJ 2 3:36
Lecture 238 Network Redundancy (OBJ 2 2:4
Lecture 239 Server Redundancy (OBJ 2 1:42
Lecture 240 Redundant Sites (OBJ 2 2:20
Lecture 241 Data Backup (OBJ 2 2:54
Lecture 242 Tape Rotation (OBJ 2 3:53
Lecture 243 Disaster Recovery Plan (OBJ 2 5:38
Lecture 244 Business Impact Analysis (OBJ 5 15:45

Section 29 : Social Engineering

Lecture 245 Social Engineering (OBJ 1 0:52
Lecture 246 Demo_ Pretexting (OBJ 1 4:14
Lecture 247 Insider Threat (OBJ 1 2:10
Lecture 248 Phishing (OBJ 1 6:31
Lecture 249 Motivation Factors (OBJ 1 7:11
Lecture 250 More Social Engineering (OBJ 1 4:0
Lecture 251 Fraud and Scams (OBJ 1 5:23
Lecture 252 Influence Campaigns (OBJ 1 4:11
Lecture 253 User Education (OBJ 5 4:44

Section 30 : Policies and Procedures

Lecture 254 Policies and Procedures (OBJ 5 5:53
Lecture 255 Data Classifications (OBJ 5 6:42
Lecture 256 Data Ownership 4:3
Lecture 257 PII and PHI (OBJ 5 6:19
Lecture 258 Legal Requirements (OBJ 5 5:42
Lecture 259 Privacy Technologies (OBJ 5 6:26
Lecture 260 Security Policies (OBJ 5 10:19
Lecture 261 3) 4:2
Lecture 262 Vendor Relationships (OBJ 5 7:52
Lecture 263 Disposal Policies (OBJ 2 5:4
Lecture 264 IT Security Frameworks (OBJ 5 3:17
Lecture 265 Key Frameworks (OBJ 5 8:34

Section 31 : Incident Response and Forensics

Lecture 266 Incident Response Procedures (OBJ 4 4:36
Lecture 267 Incident Response Planning (OBJ 4 18:16
Lecture 268 Investigative Data (OBJ 4 12:27
Lecture 269 Forensic Procedures (OBJ 4 13:52
Lecture 270 Data Collection Procedures (OBJ 4 7:56
Lecture 271 Demo_ Disk Imaging (OBJ 4 6:56
Lecture 272 Security Tools (OBJ 4 21:0