Section 1 : Overview of Security

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 2 Download the Study Guide
Lecture 3 Overview of Security 00:02:56 Duration
Lecture 4 CIA Triad 00:03:55 Duration
Lecture 5 AAA of Security (OBJ 2 00:03:06 Duration
Lecture 6 Security Threats (OBJ 1 00:02:57 Duration
Lecture 7 Mitigating Threats (OBJ 5 00:02:46 Duration
Lecture 8 Hackers (OBJ 1 00:04:53 Duration
Lecture 9 Threat Actors (1 00:03:12 Duration
Lecture 10 Threat Intelligence and Sources (OBJ 1 00:08:52 Duration
Lecture 11 Threat Hunting (OBJ 1 00:06:51 Duration
Lecture 12 Attack Frameworks (OBJ 4 00:11:09 Duration

Section 2 : Malware

Lecture 1 Malware (OBJ 1 00:00:40 Duration
Lecture 2 Viruses (OBJ 1 00:06:21 Duration
Lecture 3 Worms (OBJ 1 00:02:10 Duration
Lecture 4 Trojans (OBJ 1 00:02:48 Duration
Lecture 5 Demo_ Viruses and Trojans (OBJ 1 00:06:15 Duration
Lecture 6 Ransomware (OBJ 1 00:02:30 Duration
Lecture 7 Spyware (OBJ 1 00:02:39 Duration
Lecture 8 Rootkits (OBJ 1 00:03:29 Duration
Lecture 9 Spam (OBJ 1 00:02:56 Duration
Lecture 10 Summary of Malware 00:02:02 Duration

Section 3 : Malware Infections

Lecture 1 Malware Infections 00:04:12 Duration
Lecture 2 Common Delivery Methods (OBJ 1 00:04:27 Duration
Lecture 3 About Certification
Lecture 4 Botnets and Zombies (OBJ 1 00:03:30 Duration
Lecture 5 Active Interception and Privilege Escalation (OBJ 1 00:02:28 Duration
Lecture 6 Demo_ Privilege Escalation (OBJ 1 00:05:41 Duration
Lecture 7 Backdoors and Logic Bombs (OBJ 1 00:03:48 Duration
Lecture 8 Symptoms of Infection (OBJ 1 00:04:10 Duration
Lecture 9 Removing Malware (OBJ 4 00:05:02 Duration
Lecture 10 Preventing Malware (OBJ 1 00:05:56 Duration
Lecture 11 Malware Exploitation (OBJ 1 00:07:36 Duration

Section 4 : Security Applications and Devices

Lecture 1 Security Applications and Devices 00:00:33 Duration
Lecture 2 Software Firewalls (OBJ 3
Lecture 3 Demo_ Software Firewalls (OBJ 3 00:06:44 Duration
Lecture 4 IDS (OBJ 3 00:05:02 Duration
Lecture 5 Pop-up Blockers (OBJ 1 00:03:09 Duration
Lecture 6 Data Loss Prevention (DLP) (OBJ 2 00:03:43 Duration
Lecture 7 Securing the BIOS (OBJ 3 00:03:56 Duration
Lecture 8 Securing Storage Devices (OBJ 2 00:03:26 Duration
Lecture 9 Disk Encryption (OBJ 2 00:04:51 Duration
Lecture 10 Endpoint Analysis (OBJ 3 00:05:44 Duration

Section 5 : Mobile Device Security

Lecture 1 Mobile Device Security (OBJ 1 00:01:14 Duration
Lecture 2 Securing Wireless Devices (OBJ 3 00:01:30 Duration
Lecture 3 Mobile Malware (OBJ 1 00:06:19 Duration
Lecture 4 SIM Cloning & ID Theft (OBJ 1 00:04:01 Duration
Lecture 5 Bluetooth Attacks (OBJ 1 00:02:08 Duration
Lecture 6 Mobile Device Theft (OBJ 3 00:03:10 Duration
Lecture 7 Security of Apps (OBJ 3 00:05:06 Duration
Lecture 8 BYOD (OBJ 3 00:04:57 Duration
Lecture 9 Hardening Mobile Devices (OBJ 3 00:03:52 Duration

Section 6 : Hardening

Lecture 1 Hardening (OBJ 3 00:01:48 Duration
Lecture 2 Unnecessary Applications (OBJ 1 00:03:11 Duration
Lecture 3 Restricting Applications (OBJ 3
Lecture 4 Demo_ Unnecessary Services (OBJ 3 00:05:35 Duration
Lecture 5 Trusted Operating System (OBJ 3 00:01:56 Duration
Lecture 6 Updates and Patches (OBJ 1 00:03:26 Duration
Lecture 7 Patch Management (OBJ 1 00:03:49 Duration
Lecture 8 Group Policies (OBJ 2 00:02:33 Duration
Lecture 9 Demo_ Group Policies (OBJ 3 00:04:06 Duration
Lecture 10 File Systems and Hard Drives (OBJ 2 00:03:18 Duration

Section 7 : Suppy Chain Management

Lecture 1 Supply Chain Assessment (OBJ 1 00:05:22 Duration
Lecture 2 Root of Trust (OBJ 3 00:04:33 Duration
Lecture 3 Trusted Firmware (OBJ 3 00:04:52 Duration
Lecture 4 Secure Processing (OBJ 3 00:03:59 Duration

Section 8 : Virtualization

Lecture 1 Virtualization (OBJ 2
Lecture 2 Hypervisors (OBJ 2 00:02:37 Duration
Lecture 3 Demo_ How to create a VM (OBJ 2 00:04:38 Duration
Lecture 4 Threats to VMs (OBJ 2 00:03:43 Duration
Lecture 5 Securing VMs (OBJ 2 00:03:47 Duration
Lecture 6 Demo_ Securing VMs 00:04:41 Duration

Section 9 : Application Security

Lecture 1 Application Security 00:01:43 Duration
Lecture 2 Web Browser Security (OBJ 3 00:06:39 Duration
Lecture 3 Web Browser Concerns (OBJ 3 00:03:19 Duration
Lecture 4 Demo_ Web Browser Configuration (OBJ 3 00:05:19 Duration
Lecture 5 Securing Applications (OBJ 1 00:04:38 Duration

Section 10 : Secure Software Development

Lecture 1 Software Development (OBJ 2 00:08:34 Duration
Lecture 2 SDLC Principles (OBJ 1 00:06:23 Duration
Lecture 3 Testing Methods (OBJ 2 00:06:59 Duration
Lecture 4 Software Vulnerabilities and Exploits (OBJ 1 00:03:44 Duration
Lecture 5 Buffer Overflows (OBJ 1 00:06:15 Duration
Lecture 6 Demo_ Buffer Overflow Attack (OBJ 1 00:06:25 Duration
Lecture 7 XSS and XSRF (OBJ 1 00:03:08 Duration
Lecture 8 SQL Injection (OBJ 1 00:06:25 Duration
Lecture 9 Demo_ SQL Injection (OBJ 1 00:07:13 Duration
Lecture 10 XML Vulnerabilities (OBJ 1 00:05:07 Duration
Lecture 11 Race Conditions (OBJ 1 00:05:47 Duration
Lecture 12 Design Vulnerabilities (OBJ 1 00:04:13 Duration

Section 11 : Network Design

Lecture 1 Network Security 00:00:44 Duration
Lecture 2 The OSI Model (OBJ 3 00:06:00 Duration
Lecture 3 Switches (OBJ 1 00:03:32 Duration
Lecture 4 Routers (OBJ 3 00:02:27 Duration
Lecture 5 Network Zones (OBJ 3 00:03:26 Duration
Lecture 6 Jumpbox (OBJ 3 00:05:01 Duration
Lecture 7 Network Access Control (OBJ 3 00:02:40 Duration
Lecture 8 VLANs (OBJ 3 00:01:30 Duration
Lecture 9 Subnetting (OBJ 3 00:01:51 Duration
Lecture 10 Network Address Translation (OBJ 3 00:02:32 Duration
Lecture 11 Telephony (OBJ 3 00:05:58 Duration

Section 12 : Perimeter Security

Lecture 1 Perimeter Security 00:00:47 Duration
Lecture 2 Firewalls (OBJ 3 00:08:01 Duration
Lecture 3 About Proctor Testing
Lecture 4 Proxy Servers (OBJ 3 00:04:12 Duration
Lecture 5 Honeypots and Honeynets (OBJ 2 00:01:22 Duration
Lecture 6 Data Loss Prevention (OBJ 2 00:01:35 Duration
Lecture 7 NIDS and NIPS (OBJ 3 00:04:11 Duration
Lecture 8 Unified Threat Management (OBJ 3 00:01:52 Duration

Section 13 : Cloud Security

Lecture 1 Cloud Computing (OBJ 1 00:03:29 Duration
Lecture 2 Cloud Types (OBJ 2 00:02:52 Duration
Lecture 3 As a Service (OBJ 2 00:07:04 Duration
Lecture 4 Cloud Security (OBJ 2 00:02:25 Duration
Lecture 5 Defending Servers (OBJ 1 00:04:32 Duration
Lecture 6 Cloud-based Infrastructure (OBJ 1 00:07:19 Duration
Lecture 7 CASB (OBJ 2 00:04:24 Duration
Lecture 8 API (OBJ 2 00:06:05 Duration
Lecture 9 FAAS and Serverless (OBJ 2 00:08:05 Duration
Lecture 10 Cloud Threats (OBJ 1 00:08:08 Duration

Section 14 : Automation

Lecture 1 Workflow Orchestration (OBJ 2 00:03:57 Duration
Lecture 2 CI_CD (OBJ 2 00:07:02 Duration
Lecture 3 DevSecOps (OBJ 2 00:04:47 Duration
Lecture 4 IAC (OBJ 2 00:04:19 Duration
Lecture 5 Machine Learning (OBJ 1 00:08:26 Duration

Section 15 : Network Attacks

Lecture 1 Network Attacks (OBJ 1 00:00:38 Duration
Lecture 2 Ports and Protocols (OBJ 3 00:04:24 Duration
Lecture 3 Memorization of Ports (OBJ 3 00:11:30 Duration
Lecture 4 Unnecessary Ports (OBJ 1 00:03:21 Duration
Lecture 5 Denial of Service (OBJ 1 00:07:56 Duration
Lecture 6 DDoS (OBJ 1 00:01:36 Duration
Lecture 7 Stopping a DDoS (OBJ 2 00:02:27 Duration
Lecture 8 Spoofing (OBJ 1 00:01:16 Duration
Lecture 9 Hijacking (OBJ 1 00:03:45 Duration
Lecture 10 Replay Attack (OBJ 1 00:01:27 Duration
Lecture 11 Demo_ Null Sessions (OBJ 1 00:02:24 Duration
Lecture 12 Transitive Attacks (OBJ 2 00:01:25 Duration
Lecture 13 DNS Attacks (OBJ 1 00:04:33 Duration
Lecture 14 ARP Poisoning (OBJ 1 00:01:30 Duration

Section 16 : Securing Networks

Lecture 1 Securing Networks (OBJ 3 00:00:49 Duration
Lecture 2 Securing Network Devices (OBJ 1 00:06:43 Duration
Lecture 3 Securing Network Media (OBJ 2 00:08:48 Duration
Lecture 4 Securing WiFi Devices (OBJ 1 00:04:22 Duration
Lecture 5 Wireless Encryption (OBJ 1 00:05:31 Duration
Lecture 6 Wireless Access Points (OBJ 1 00:06:12 Duration
Lecture 7 Wireless Attacks (OBJ 1 00:04:16 Duration
Lecture 8 Demo_ Wireless Attack (OBJ 1 00:07:39 Duration
Lecture 9 WPA3 (OBJ 3 00:06:05 Duration
Lecture 10 Other Wireless Technologies (OBJ 1 00:06:02 Duration

Section 17 : Physical Security

Lecture 1 Physical Security (OBJ 2 00:01:31 Duration
Lecture 2 Surveillance (OBJ 2 00:02:51 Duration
Lecture 3 Door Locks (OBJ 2 00:03:48 Duration
Lecture 4 Demo_ Lock Picking (OBJ 2 00:01:37 Duration
Lecture 5 Biometric Readers (OBJ 2

Section 18 : Facilities Security

Lecture 1 Facilities Security (OBJ 2 00:00:37 Duration
Lecture 2 Fire Suppression (OBJ 2 00:06:21 Duration
Lecture 3 HVAC (OBJ 2 00:02:23 Duration
Lecture 4 Shielding (OBJ 2 00:02:35 Duration
Lecture 5 Vehicular Vulnerabilities (OBJ 2 00:06:50 Duration
Lecture 6 IoT Vulnerabilities (OBJ 2 00:03:26 Duration
Lecture 7 Embedded System Vulnerabilities (OBJ 2 00:06:49 Duration
Lecture 8 ICS and SCADA Vulnerabilities (OBJ 2 00:08:16 Duration
Lecture 9 Mitigating Vulnerabilities (OBJ 2
Lecture 10 Premise System Vulnerabilities (OBJ 1 00:06:10 Duration

Section 19 : Authentication

Lecture 1 Authentication (OBJ 2 00:05:53 Duration
Lecture 2 Authentication Models (OBJ 2 00:05:19 Duration
Lecture 3 802 00:03:44 Duration
Lecture 4 LDAP and Kerberos (OBJ 3 00:02:26 Duration
Lecture 5 Remote Desktop Services (OBJ 3 00:01:51 Duration
Lecture 6 Remote Access Service (OBJ 3 00:02:03 Duration
Lecture 7 VPN (OBJ 3 00:03:02 Duration
Lecture 8 RADIUS vs TACACS+ (OBJ 3 00:02:18 Duration
Lecture 9 Authentication Summary (OBJ 3 00:02:04 Duration
Lecture 10 Authentication Attacks (OBJ 1 00:07:09 Duration

Section 20 : Access Control

Lecture 1 Access Control (OBJ 3 00:00:50 Duration
Lecture 2 Access Control Models (OBJ 3 00:08:14 Duration
Lecture 3 Best Practices (OBJ 2 00:05:43 Duration
Lecture 4 Users and Groups (OBJ 3 00:09:12 Duration
Lecture 5 Permissions (OBJ 3 00:03:41 Duration
Lecture 6 Usernames and Passwords (OBJ 1 00:02:36 Duration
Lecture 7 Demo_ Policies (OBJ 3 00:04:34 Duration
Lecture 8 User Account Control (OBJ 3 00:01:53 Duration

Section 21 : Risk Assessments

Lecture 1 Risk Assessments (OBJ 5 00:08:34 Duration
Lecture 2 Qualitative Risk (OBJ 5 00:04:06 Duration
Lecture 3 Quantitative Risk (OBJ 5 00:05:27 Duration
Lecture 4 Methodologies (OBJ 1 00:02:49 Duration
Lecture 5 Security Controls (OBJ 5 00:06:49 Duration
Lecture 6 Types of Risk (OBJ 1 00:07:10 Duration

Section 22 : Vulnerability Management

Lecture 1 Vulnerability Management (OBJ 1 00:07:50 Duration
Lecture 2 Penetration Testing (OBJ 1 00:04:27 Duration
Lecture 3 Training and Exercises (OBJ 1 00:04:46 Duration
Lecture 4 OVAL (OBJ 1 00:01:34 Duration
Lecture 5 Vulnerability Assessments (OBJ 1 00:06:52 Duration
Lecture 6 Demo_ Nmap Scanning (OBJ 4 00:08:50 Duration
Lecture 7 Demo_ Vulnerability Scanning (OBJ 1 00:09:33 Duration
Lecture 8 Password Analysis (OBJ 1 00:05:54 Duration
Lecture 9 Demo_ Password Cracking (OBJ 4 00:02:36 Duration

Section 23 : Monitoring and Auditing

Lecture 1 Monitoring Types (OBJ 3 00:02:54 Duration
Lecture 2 Performance Baselining (OBJ 2 00:04:35 Duration
Lecture 3 Protocol Analyzers (OBJ 3 00:02:58 Duration
Lecture 4 SNMP (OBJ 3 00:03:40 Duration
Lecture 5 Demo_ Analytical Tools (OBJ 4 00:04:27 Duration
Lecture 6 Auditing (OBJ 1 00:01:54 Duration
Lecture 7 Demo_ Auditing Files (OBJ 1 00:03:53 Duration
Lecture 8 Logging (OBJ 1 00:03:39 Duration
Lecture 9 Log Files (OBJ 4 00:05:14 Duration
Lecture 10 SIEM (OBJ 1 00:08:48 Duration
Lecture 11 Syslog (OBJ 1 00:05:49 Duration
Lecture 12 SOAR (OBJ 1 00:03:17 Duration

Section 24 : Cryptography

Lecture 1 Cryptography (OBJ 2 00:04:55 Duration
Lecture 2 Symmetric vs Asymmetric (OBJ 2 00:06:12 Duration
Lecture 3 Symmetric Algorithms (OBJ 2 00:04:56 Duration
Lecture 4 Public Key Cryptography (OBJ 2 00:03:09 Duration
Lecture 5 Asymmetric Algorithms (OBJ 2 00:03:44 Duration
Lecture 6 Pretty Good Privacy (OBJ 2 00:01:46 Duration
Lecture 7 Key Management (OBJ 2 00:02:11 Duration
Lecture 8 One-Time Pad (OBJ 2 00:04:19 Duration
Lecture 9 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 10 Cryptography Considerations (OBJ 2 00:12:23 Duration

Section 25 : Hashing

Lecture 1 Hashing (OBJ 1 00:08:28 Duration
Lecture 2 Demo_ Hashing (OBJ 2 00:03:03 Duration
Lecture 3 Hashing Attacks (OBJ 1 00:03:15 Duration
Lecture 4 Increasing Hash Security (OBJ 2 00:01:27 Duration

Section 26 : Public Key Infrastructure

Lecture 1 Public Key Infrastructure (OBJ 3 00:03:53 Duration
Lecture 2 Digital Certificates (OBJ 3 00:06:43 Duration
Lecture 3 About Certification
Lecture 4 Certificate Authorities (OBJ 3 00:04:13 Duration
Lecture 5 Web of Trust (OBJ 3 00:02:35 Duration

Section 27 : Security Protocols

Lecture 1 Security Protocols (OBJ 3 00:00:21 Duration
Lecture 2 S_MIME (OBJ 3 00:01:30 Duration
Lecture 3 SSL and TLS (OBJ 1 00:05:35 Duration
Lecture 4 SSH (OBJ 3 00:02:28 Duration
Lecture 5 VPN Protocols (OBJ 3 00:06:37 Duration
Lecture 6 About Proctor Testing

Section 28 : Planning for the Worst

Lecture 1 Planning for the Worst (OBJ 2 00:02:10 Duration
Lecture 2 Redundant Power (OBJ 2 00:03:08 Duration
Lecture 3 Backup Power (OBJ 2 00:03:06 Duration
Lecture 4 Data Redundancy (OBJ 2 00:04:39 Duration
Lecture 5 Demo_ RAIDs (OBJ 2 00:03:36 Duration
Lecture 6 Network Redundancy (OBJ 2 00:02:04 Duration
Lecture 7 Server Redundancy (OBJ 2 00:01:42 Duration
Lecture 8 Redundant Sites (OBJ 2 00:02:20 Duration
Lecture 9 Data Backup (OBJ 2 00:02:54 Duration
Lecture 10 Tape Rotation (OBJ 2 00:03:53 Duration
Lecture 11 Disaster Recovery Plan (OBJ 2 00:05:38 Duration
Lecture 12 Business Impact Analysis (OBJ 5 00:15:45 Duration

Section 29 : Social Engineering

Lecture 1 Social Engineering (OBJ 1 00:00:52 Duration
Lecture 2 Demo_ Pretexting (OBJ 1 00:04:14 Duration
Lecture 3 Insider Threat (OBJ 1 00:02:10 Duration
Lecture 4 Phishing (OBJ 1 00:06:31 Duration
Lecture 5 Motivation Factors (OBJ 1 00:07:11 Duration
Lecture 6 More Social Engineering (OBJ 1 00:04:00 Duration
Lecture 7 Fraud and Scams (OBJ 1 00:05:23 Duration
Lecture 8 Influence Campaigns (OBJ 1 00:04:11 Duration
Lecture 9 User Education (OBJ 5 00:04:44 Duration

Section 30 : Policies and Procedures

Lecture 1 Policies and Procedures (OBJ 5 00:05:53 Duration
Lecture 2 Data Classifications (OBJ 5 00:06:42 Duration
Lecture 3 Data Ownership 00:04:03 Duration
Lecture 4 PII and PHI (OBJ 5 00:06:19 Duration
Lecture 5 Legal Requirements (OBJ 5 00:05:42 Duration
Lecture 6 Privacy Technologies (OBJ 5 00:06:26 Duration
Lecture 7 Security Policies (OBJ 5 00:10:19 Duration
Lecture 8 3) 00:04:02 Duration
Lecture 9 Vendor Relationships (OBJ 5 00:07:52 Duration
Lecture 10 Disposal Policies (OBJ 2 00:05:04 Duration
Lecture 11 IT Security Frameworks (OBJ 5 00:03:17 Duration
Lecture 12 Key Frameworks (OBJ 5 00:08:34 Duration

Section 31 : Incident Response and Forensics

Lecture 1 Incident Response Procedures (OBJ 4 00:04:36 Duration
Lecture 2 Incident Response Planning (OBJ 4 00:18:16 Duration
Lecture 3 Investigative Data (OBJ 4 00:12:27 Duration
Lecture 4 Forensic Procedures (OBJ 4 00:13:52 Duration
Lecture 5 Data Collection Procedures (OBJ 4 00:07:56 Duration
Lecture 6 Demo_ Disk Imaging (OBJ 4 00:06:56 Duration
Lecture 7 Security Tools (OBJ 4 00:21:00 Duration