Section 1 : Overview of Security
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 2 | Download the Study Guide | |
|
Lecture 3 | Overview of Security | 00:02:56 Duration |
|
Lecture 4 | CIA Triad | 00:03:55 Duration |
|
Lecture 5 | AAA of Security (OBJ 2 | 00:03:06 Duration |
|
Lecture 6 | Security Threats (OBJ 1 | 00:02:57 Duration |
|
Lecture 7 | Mitigating Threats (OBJ 5 | 00:02:46 Duration |
|
Lecture 8 | Hackers (OBJ 1 | 00:04:53 Duration |
|
Lecture 9 | Threat Actors (1 | 00:03:12 Duration |
|
Lecture 10 | Threat Intelligence and Sources (OBJ 1 | 00:08:52 Duration |
|
Lecture 11 | Threat Hunting (OBJ 1 | 00:06:51 Duration |
|
Lecture 12 | Attack Frameworks (OBJ 4 | 00:11:09 Duration |
Section 2 : Malware
|
Lecture 1 | Malware (OBJ 1 | 00:00:40 Duration |
|
Lecture 2 | Viruses (OBJ 1 | 00:06:21 Duration |
|
Lecture 3 | Worms (OBJ 1 | 00:02:10 Duration |
|
Lecture 4 | Trojans (OBJ 1 | 00:02:48 Duration |
|
Lecture 5 | Demo_ Viruses and Trojans (OBJ 1 | 00:06:15 Duration |
|
Lecture 6 | Ransomware (OBJ 1 | 00:02:30 Duration |
|
Lecture 7 | Spyware (OBJ 1 | 00:02:39 Duration |
|
Lecture 8 | Rootkits (OBJ 1 | 00:03:29 Duration |
|
Lecture 9 | Spam (OBJ 1 | 00:02:56 Duration |
|
Lecture 10 | Summary of Malware | 00:02:02 Duration |
Section 3 : Malware Infections
|
Lecture 1 | Malware Infections | 00:04:12 Duration |
|
Lecture 2 | Common Delivery Methods (OBJ 1 | 00:04:27 Duration |
|
Lecture 3 | About Certification | |
|
Lecture 4 | Botnets and Zombies (OBJ 1 | 00:03:30 Duration |
|
Lecture 5 | Active Interception and Privilege Escalation (OBJ 1 | 00:02:28 Duration |
|
Lecture 6 | Demo_ Privilege Escalation (OBJ 1 | 00:05:41 Duration |
|
Lecture 7 | Backdoors and Logic Bombs (OBJ 1 | 00:03:48 Duration |
|
Lecture 8 | Symptoms of Infection (OBJ 1 | 00:04:10 Duration |
|
Lecture 9 | Removing Malware (OBJ 4 | 00:05:02 Duration |
|
Lecture 10 | Preventing Malware (OBJ 1 | 00:05:56 Duration |
|
Lecture 11 | Malware Exploitation (OBJ 1 | 00:07:36 Duration |
Section 4 : Security Applications and Devices
|
Lecture 1 | Security Applications and Devices | 00:00:33 Duration |
|
Lecture 2 | Software Firewalls (OBJ 3 | |
|
Lecture 3 | Demo_ Software Firewalls (OBJ 3 | 00:06:44 Duration |
|
Lecture 4 | IDS (OBJ 3 | 00:05:02 Duration |
|
Lecture 5 | Pop-up Blockers (OBJ 1 | 00:03:09 Duration |
|
Lecture 6 | Data Loss Prevention (DLP) (OBJ 2 | 00:03:43 Duration |
|
Lecture 7 | Securing the BIOS (OBJ 3 | 00:03:56 Duration |
|
Lecture 8 | Securing Storage Devices (OBJ 2 | 00:03:26 Duration |
|
Lecture 9 | Disk Encryption (OBJ 2 | 00:04:51 Duration |
|
Lecture 10 | Endpoint Analysis (OBJ 3 | 00:05:44 Duration |
Section 5 : Mobile Device Security
|
Lecture 1 | Mobile Device Security (OBJ 1 | 00:01:14 Duration |
|
Lecture 2 | Securing Wireless Devices (OBJ 3 | 00:01:30 Duration |
|
Lecture 3 | Mobile Malware (OBJ 1 | 00:06:19 Duration |
|
Lecture 4 | SIM Cloning & ID Theft (OBJ 1 | 00:04:01 Duration |
|
Lecture 5 | Bluetooth Attacks (OBJ 1 | 00:02:08 Duration |
|
Lecture 6 | Mobile Device Theft (OBJ 3 | 00:03:10 Duration |
|
Lecture 7 | Security of Apps (OBJ 3 | 00:05:06 Duration |
|
Lecture 8 | BYOD (OBJ 3 | 00:04:57 Duration |
|
Lecture 9 | Hardening Mobile Devices (OBJ 3 | 00:03:52 Duration |
Section 6 : Hardening
|
Lecture 1 | Hardening (OBJ 3 | 00:01:48 Duration |
|
Lecture 2 | Unnecessary Applications (OBJ 1 | 00:03:11 Duration |
|
Lecture 3 | Restricting Applications (OBJ 3 | |
|
Lecture 4 | Demo_ Unnecessary Services (OBJ 3 | 00:05:35 Duration |
|
Lecture 5 | Trusted Operating System (OBJ 3 | 00:01:56 Duration |
|
Lecture 6 | Updates and Patches (OBJ 1 | 00:03:26 Duration |
|
Lecture 7 | Patch Management (OBJ 1 | 00:03:49 Duration |
|
Lecture 8 | Group Policies (OBJ 2 | 00:02:33 Duration |
|
Lecture 9 | Demo_ Group Policies (OBJ 3 | 00:04:06 Duration |
|
Lecture 10 | File Systems and Hard Drives (OBJ 2 | 00:03:18 Duration |
Section 7 : Suppy Chain Management
|
Lecture 1 | Supply Chain Assessment (OBJ 1 | 00:05:22 Duration |
|
Lecture 2 | Root of Trust (OBJ 3 | 00:04:33 Duration |
|
Lecture 3 | Trusted Firmware (OBJ 3 | 00:04:52 Duration |
|
Lecture 4 | Secure Processing (OBJ 3 | 00:03:59 Duration |
Section 8 : Virtualization
|
Lecture 1 | Virtualization (OBJ 2 | |
|
Lecture 2 | Hypervisors (OBJ 2 | 00:02:37 Duration |
|
Lecture 3 | Demo_ How to create a VM (OBJ 2 | 00:04:38 Duration |
|
Lecture 4 | Threats to VMs (OBJ 2 | 00:03:43 Duration |
|
Lecture 5 | Securing VMs (OBJ 2 | 00:03:47 Duration |
|
Lecture 6 | Demo_ Securing VMs | 00:04:41 Duration |
Section 9 : Application Security
|
Lecture 1 | Application Security | 00:01:43 Duration |
|
Lecture 2 | Web Browser Security (OBJ 3 | 00:06:39 Duration |
|
Lecture 3 | Web Browser Concerns (OBJ 3 | 00:03:19 Duration |
|
Lecture 4 | Demo_ Web Browser Configuration (OBJ 3 | 00:05:19 Duration |
|
Lecture 5 | Securing Applications (OBJ 1 | 00:04:38 Duration |
Section 10 : Secure Software Development
|
Lecture 1 | Software Development (OBJ 2 | 00:08:34 Duration |
|
Lecture 2 | SDLC Principles (OBJ 1 | 00:06:23 Duration |
|
Lecture 3 | Testing Methods (OBJ 2 | 00:06:59 Duration |
|
Lecture 4 | Software Vulnerabilities and Exploits (OBJ 1 | 00:03:44 Duration |
|
Lecture 5 | Buffer Overflows (OBJ 1 | 00:06:15 Duration |
|
Lecture 6 | Demo_ Buffer Overflow Attack (OBJ 1 | 00:06:25 Duration |
|
Lecture 7 | XSS and XSRF (OBJ 1 | 00:03:08 Duration |
|
Lecture 8 | SQL Injection (OBJ 1 | 00:06:25 Duration |
|
Lecture 9 | Demo_ SQL Injection (OBJ 1 | 00:07:13 Duration |
|
Lecture 10 | XML Vulnerabilities (OBJ 1 | 00:05:07 Duration |
|
Lecture 11 | Race Conditions (OBJ 1 | 00:05:47 Duration |
|
Lecture 12 | Design Vulnerabilities (OBJ 1 | 00:04:13 Duration |
Section 11 : Network Design
|
Lecture 1 | Network Security | 00:00:44 Duration |
|
Lecture 2 | The OSI Model (OBJ 3 | 00:06:00 Duration |
|
Lecture 3 | Switches (OBJ 1 | 00:03:32 Duration |
|
Lecture 4 | Routers (OBJ 3 | 00:02:27 Duration |
|
Lecture 5 | Network Zones (OBJ 3 | 00:03:26 Duration |
|
Lecture 6 | Jumpbox (OBJ 3 | 00:05:01 Duration |
|
Lecture 7 | Network Access Control (OBJ 3 | 00:02:40 Duration |
|
Lecture 8 | VLANs (OBJ 3 | 00:01:30 Duration |
|
Lecture 9 | Subnetting (OBJ 3 | 00:01:51 Duration |
|
Lecture 10 | Network Address Translation (OBJ 3 | 00:02:32 Duration |
|
Lecture 11 | Telephony (OBJ 3 | 00:05:58 Duration |
Section 12 : Perimeter Security
|
Lecture 1 | Perimeter Security | 00:00:47 Duration |
|
Lecture 2 | Firewalls (OBJ 3 | 00:08:01 Duration |
|
Lecture 3 | About Proctor Testing | |
|
Lecture 4 | Proxy Servers (OBJ 3 | 00:04:12 Duration |
|
Lecture 5 | Honeypots and Honeynets (OBJ 2 | 00:01:22 Duration |
|
Lecture 6 | Data Loss Prevention (OBJ 2 | 00:01:35 Duration |
|
Lecture 7 | NIDS and NIPS (OBJ 3 | 00:04:11 Duration |
|
Lecture 8 | Unified Threat Management (OBJ 3 | 00:01:52 Duration |
Section 13 : Cloud Security
|
Lecture 1 | Cloud Computing (OBJ 1 | 00:03:29 Duration |
|
Lecture 2 | Cloud Types (OBJ 2 | 00:02:52 Duration |
|
Lecture 3 | As a Service (OBJ 2 | 00:07:04 Duration |
|
Lecture 4 | Cloud Security (OBJ 2 | 00:02:25 Duration |
|
Lecture 5 | Defending Servers (OBJ 1 | 00:04:32 Duration |
|
Lecture 6 | Cloud-based Infrastructure (OBJ 1 | 00:07:19 Duration |
|
Lecture 7 | CASB (OBJ 2 | 00:04:24 Duration |
|
Lecture 8 | API (OBJ 2 | 00:06:05 Duration |
|
Lecture 9 | FAAS and Serverless (OBJ 2 | 00:08:05 Duration |
|
Lecture 10 | Cloud Threats (OBJ 1 | 00:08:08 Duration |
Section 14 : Automation
|
Lecture 1 | Workflow Orchestration (OBJ 2 | 00:03:57 Duration |
|
Lecture 2 | CI_CD (OBJ 2 | 00:07:02 Duration |
|
Lecture 3 | DevSecOps (OBJ 2 | 00:04:47 Duration |
|
Lecture 4 | IAC (OBJ 2 | 00:04:19 Duration |
|
Lecture 5 | Machine Learning (OBJ 1 | 00:08:26 Duration |
Section 15 : Network Attacks
|
Lecture 1 | Network Attacks (OBJ 1 | 00:00:38 Duration |
|
Lecture 2 | Ports and Protocols (OBJ 3 | 00:04:24 Duration |
|
Lecture 3 | Memorization of Ports (OBJ 3 | 00:11:30 Duration |
|
Lecture 4 | Unnecessary Ports (OBJ 1 | 00:03:21 Duration |
|
Lecture 5 | Denial of Service (OBJ 1 | 00:07:56 Duration |
|
Lecture 6 | DDoS (OBJ 1 | 00:01:36 Duration |
|
Lecture 7 | Stopping a DDoS (OBJ 2 | 00:02:27 Duration |
|
Lecture 8 | Spoofing (OBJ 1 | 00:01:16 Duration |
|
Lecture 9 | Hijacking (OBJ 1 | 00:03:45 Duration |
|
Lecture 10 | Replay Attack (OBJ 1 | 00:01:27 Duration |
|
Lecture 11 | Demo_ Null Sessions (OBJ 1 | 00:02:24 Duration |
|
Lecture 12 | Transitive Attacks (OBJ 2 | 00:01:25 Duration |
|
Lecture 13 | DNS Attacks (OBJ 1 | 00:04:33 Duration |
|
Lecture 14 | ARP Poisoning (OBJ 1 | 00:01:30 Duration |
Section 16 : Securing Networks
|
Lecture 1 | Securing Networks (OBJ 3 | 00:00:49 Duration |
|
Lecture 2 | Securing Network Devices (OBJ 1 | 00:06:43 Duration |
|
Lecture 3 | Securing Network Media (OBJ 2 | 00:08:48 Duration |
|
Lecture 4 | Securing WiFi Devices (OBJ 1 | 00:04:22 Duration |
|
Lecture 5 | Wireless Encryption (OBJ 1 | 00:05:31 Duration |
|
Lecture 6 | Wireless Access Points (OBJ 1 | 00:06:12 Duration |
|
Lecture 7 | Wireless Attacks (OBJ 1 | 00:04:16 Duration |
|
Lecture 8 | Demo_ Wireless Attack (OBJ 1 | 00:07:39 Duration |
|
Lecture 9 | WPA3 (OBJ 3 | 00:06:05 Duration |
|
Lecture 10 | Other Wireless Technologies (OBJ 1 | 00:06:02 Duration |
Section 17 : Physical Security
|
Lecture 1 | Physical Security (OBJ 2 | 00:01:31 Duration |
|
Lecture 2 | Surveillance (OBJ 2 | 00:02:51 Duration |
|
Lecture 3 | Door Locks (OBJ 2 | 00:03:48 Duration |
|
Lecture 4 | Demo_ Lock Picking (OBJ 2 | 00:01:37 Duration |
|
Lecture 5 | Biometric Readers (OBJ 2 |
Section 18 : Facilities Security
|
Lecture 1 | Facilities Security (OBJ 2 | 00:00:37 Duration |
|
Lecture 2 | Fire Suppression (OBJ 2 | 00:06:21 Duration |
|
Lecture 3 | HVAC (OBJ 2 | 00:02:23 Duration |
|
Lecture 4 | Shielding (OBJ 2 | 00:02:35 Duration |
|
Lecture 5 | Vehicular Vulnerabilities (OBJ 2 | 00:06:50 Duration |
|
Lecture 6 | IoT Vulnerabilities (OBJ 2 | 00:03:26 Duration |
|
Lecture 7 | Embedded System Vulnerabilities (OBJ 2 | 00:06:49 Duration |
|
Lecture 8 | ICS and SCADA Vulnerabilities (OBJ 2 | 00:08:16 Duration |
|
Lecture 9 | Mitigating Vulnerabilities (OBJ 2 | |
|
Lecture 10 | Premise System Vulnerabilities (OBJ 1 | 00:06:10 Duration |
Section 19 : Authentication
|
Lecture 1 | Authentication (OBJ 2 | 00:05:53 Duration |
|
Lecture 2 | Authentication Models (OBJ 2 | 00:05:19 Duration |
|
Lecture 3 | 802 | 00:03:44 Duration |
|
Lecture 4 | LDAP and Kerberos (OBJ 3 | 00:02:26 Duration |
|
Lecture 5 | Remote Desktop Services (OBJ 3 | 00:01:51 Duration |
|
Lecture 6 | Remote Access Service (OBJ 3 | 00:02:03 Duration |
|
Lecture 7 | VPN (OBJ 3 | 00:03:02 Duration |
|
Lecture 8 | RADIUS vs TACACS+ (OBJ 3 | 00:02:18 Duration |
|
Lecture 9 | Authentication Summary (OBJ 3 | 00:02:04 Duration |
|
Lecture 10 | Authentication Attacks (OBJ 1 | 00:07:09 Duration |
Section 20 : Access Control
|
Lecture 1 | Access Control (OBJ 3 | 00:00:50 Duration |
|
Lecture 2 | Access Control Models (OBJ 3 | 00:08:14 Duration |
|
Lecture 3 | Best Practices (OBJ 2 | 00:05:43 Duration |
|
Lecture 4 | Users and Groups (OBJ 3 | 00:09:12 Duration |
|
Lecture 5 | Permissions (OBJ 3 | 00:03:41 Duration |
|
Lecture 6 | Usernames and Passwords (OBJ 1 | 00:02:36 Duration |
|
Lecture 7 | Demo_ Policies (OBJ 3 | 00:04:34 Duration |
|
Lecture 8 | User Account Control (OBJ 3 | 00:01:53 Duration |
Section 21 : Risk Assessments
|
Lecture 1 | Risk Assessments (OBJ 5 | 00:08:34 Duration |
|
Lecture 2 | Qualitative Risk (OBJ 5 | 00:04:06 Duration |
|
Lecture 3 | Quantitative Risk (OBJ 5 | 00:05:27 Duration |
|
Lecture 4 | Methodologies (OBJ 1 | 00:02:49 Duration |
|
Lecture 5 | Security Controls (OBJ 5 | 00:06:49 Duration |
|
Lecture 6 | Types of Risk (OBJ 1 | 00:07:10 Duration |
Section 22 : Vulnerability Management
|
Lecture 1 | Vulnerability Management (OBJ 1 | 00:07:50 Duration |
|
Lecture 2 | Penetration Testing (OBJ 1 | 00:04:27 Duration |
|
Lecture 3 | Training and Exercises (OBJ 1 | 00:04:46 Duration |
|
Lecture 4 | OVAL (OBJ 1 | 00:01:34 Duration |
|
Lecture 5 | Vulnerability Assessments (OBJ 1 | 00:06:52 Duration |
|
Lecture 6 | Demo_ Nmap Scanning (OBJ 4 | 00:08:50 Duration |
|
Lecture 7 | Demo_ Vulnerability Scanning (OBJ 1 | 00:09:33 Duration |
|
Lecture 8 | Password Analysis (OBJ 1 | 00:05:54 Duration |
|
Lecture 9 | Demo_ Password Cracking (OBJ 4 | 00:02:36 Duration |
Section 23 : Monitoring and Auditing
|
Lecture 1 | Monitoring Types (OBJ 3 | 00:02:54 Duration |
|
Lecture 2 | Performance Baselining (OBJ 2 | 00:04:35 Duration |
|
Lecture 3 | Protocol Analyzers (OBJ 3 | 00:02:58 Duration |
|
Lecture 4 | SNMP (OBJ 3 | 00:03:40 Duration |
|
Lecture 5 | Demo_ Analytical Tools (OBJ 4 | 00:04:27 Duration |
|
Lecture 6 | Auditing (OBJ 1 | 00:01:54 Duration |
|
Lecture 7 | Demo_ Auditing Files (OBJ 1 | 00:03:53 Duration |
|
Lecture 8 | Logging (OBJ 1 | 00:03:39 Duration |
|
Lecture 9 | Log Files (OBJ 4 | 00:05:14 Duration |
|
Lecture 10 | SIEM (OBJ 1 | 00:08:48 Duration |
|
Lecture 11 | Syslog (OBJ 1 | 00:05:49 Duration |
|
Lecture 12 | SOAR (OBJ 1 | 00:03:17 Duration |
Section 24 : Cryptography
|
Lecture 1 | Cryptography (OBJ 2 | 00:04:55 Duration |
|
Lecture 2 | Symmetric vs Asymmetric (OBJ 2 | 00:06:12 Duration |
|
Lecture 3 | Symmetric Algorithms (OBJ 2 | 00:04:56 Duration |
|
Lecture 4 | Public Key Cryptography (OBJ 2 | 00:03:09 Duration |
|
Lecture 5 | Asymmetric Algorithms (OBJ 2 | 00:03:44 Duration |
|
Lecture 6 | Pretty Good Privacy (OBJ 2 | 00:01:46 Duration |
|
Lecture 7 | Key Management (OBJ 2 | 00:02:11 Duration |
|
Lecture 8 | One-Time Pad (OBJ 2 | 00:04:19 Duration |
|
Lecture 9 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 10 | Cryptography Considerations (OBJ 2 | 00:12:23 Duration |
Section 25 : Hashing
|
Lecture 1 | Hashing (OBJ 1 | 00:08:28 Duration |
|
Lecture 2 | Demo_ Hashing (OBJ 2 | 00:03:03 Duration |
|
Lecture 3 | Hashing Attacks (OBJ 1 | 00:03:15 Duration |
|
Lecture 4 | Increasing Hash Security (OBJ 2 | 00:01:27 Duration |
Section 26 : Public Key Infrastructure
|
Lecture 1 | Public Key Infrastructure (OBJ 3 | 00:03:53 Duration |
|
Lecture 2 | Digital Certificates (OBJ 3 | 00:06:43 Duration |
|
Lecture 3 | About Certification | |
|
Lecture 4 | Certificate Authorities (OBJ 3 | 00:04:13 Duration |
|
Lecture 5 | Web of Trust (OBJ 3 | 00:02:35 Duration |
Section 27 : Security Protocols
|
Lecture 1 | Security Protocols (OBJ 3 | 00:00:21 Duration |
|
Lecture 2 | S_MIME (OBJ 3 | 00:01:30 Duration |
|
Lecture 3 | SSL and TLS (OBJ 1 | 00:05:35 Duration |
|
Lecture 4 | SSH (OBJ 3 | 00:02:28 Duration |
|
Lecture 5 | VPN Protocols (OBJ 3 | 00:06:37 Duration |
|
Lecture 6 | About Proctor Testing |
Section 28 : Planning for the Worst
|
Lecture 1 | Planning for the Worst (OBJ 2 | 00:02:10 Duration |
|
Lecture 2 | Redundant Power (OBJ 2 | 00:03:08 Duration |
|
Lecture 3 | Backup Power (OBJ 2 | 00:03:06 Duration |
|
Lecture 4 | Data Redundancy (OBJ 2 | 00:04:39 Duration |
|
Lecture 5 | Demo_ RAIDs (OBJ 2 | 00:03:36 Duration |
|
Lecture 6 | Network Redundancy (OBJ 2 | 00:02:04 Duration |
|
Lecture 7 | Server Redundancy (OBJ 2 | 00:01:42 Duration |
|
Lecture 8 | Redundant Sites (OBJ 2 | 00:02:20 Duration |
|
Lecture 9 | Data Backup (OBJ 2 | 00:02:54 Duration |
|
Lecture 10 | Tape Rotation (OBJ 2 | 00:03:53 Duration |
|
Lecture 11 | Disaster Recovery Plan (OBJ 2 | 00:05:38 Duration |
|
Lecture 12 | Business Impact Analysis (OBJ 5 | 00:15:45 Duration |
Section 29 : Social Engineering
|
Lecture 1 | Social Engineering (OBJ 1 | 00:00:52 Duration |
|
Lecture 2 | Demo_ Pretexting (OBJ 1 | 00:04:14 Duration |
|
Lecture 3 | Insider Threat (OBJ 1 | 00:02:10 Duration |
|
Lecture 4 | Phishing (OBJ 1 | 00:06:31 Duration |
|
Lecture 5 | Motivation Factors (OBJ 1 | 00:07:11 Duration |
|
Lecture 6 | More Social Engineering (OBJ 1 | 00:04:00 Duration |
|
Lecture 7 | Fraud and Scams (OBJ 1 | 00:05:23 Duration |
|
Lecture 8 | Influence Campaigns (OBJ 1 | 00:04:11 Duration |
|
Lecture 9 | User Education (OBJ 5 | 00:04:44 Duration |
Section 30 : Policies and Procedures
|
Lecture 1 | Policies and Procedures (OBJ 5 | 00:05:53 Duration |
|
Lecture 2 | Data Classifications (OBJ 5 | 00:06:42 Duration |
|
Lecture 3 | Data Ownership | 00:04:03 Duration |
|
Lecture 4 | PII and PHI (OBJ 5 | 00:06:19 Duration |
|
Lecture 5 | Legal Requirements (OBJ 5 | 00:05:42 Duration |
|
Lecture 6 | Privacy Technologies (OBJ 5 | 00:06:26 Duration |
|
Lecture 7 | Security Policies (OBJ 5 | 00:10:19 Duration |
|
Lecture 8 | 3) | 00:04:02 Duration |
|
Lecture 9 | Vendor Relationships (OBJ 5 | 00:07:52 Duration |
|
Lecture 10 | Disposal Policies (OBJ 2 | 00:05:04 Duration |
|
Lecture 11 | IT Security Frameworks (OBJ 5 | 00:03:17 Duration |
|
Lecture 12 | Key Frameworks (OBJ 5 | 00:08:34 Duration |
Section 31 : Incident Response and Forensics
|
Lecture 1 | Incident Response Procedures (OBJ 4 | 00:04:36 Duration |
|
Lecture 2 | Incident Response Planning (OBJ 4 | 00:18:16 Duration |
|
Lecture 3 | Investigative Data (OBJ 4 | 00:12:27 Duration |
|
Lecture 4 | Forensic Procedures (OBJ 4 | 00:13:52 Duration |
|
Lecture 5 | Data Collection Procedures (OBJ 4 | 00:07:56 Duration |
|
Lecture 6 | Demo_ Disk Imaging (OBJ 4 | 00:06:56 Duration |
|
Lecture 7 | Security Tools (OBJ 4 | 00:21:00 Duration |