Section 1 : Introduction

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 2 Download Your Free Study Guide

Section 2 : Data Considerations (Domain 4)

Lecture 1 Data Considerations (OBJ 4 00:00:54 Duration
Lecture 2 Data Security (OBJ 00:03:41 Duration
Lecture 3 Data Classification (OBJ 00:02:44 Duration
Lecture 4 Data Types (OBJ 00:05:21 Duration
Lecture 5 Data Retention (OBJ 00:06:52 Duration
Lecture 6 Data Destruction (OBJ 00:02:52 Duration
Lecture 7 Data Ownership (OBJ 00:05:31 Duration
Lecture 8 Data Sovereignty (OBJ 00:03:14 Duration

Section 3 : Risk Management (Domain 4)

Lecture 1 Risk Management (OBJ 4 00:01:27 Duration
Lecture 2 Risk Strategies (OBJ 00:04:27 Duration
Lecture 3 Risk Management Lifecycle (OBJ 00:11:49 Duration
Lecture 4 Risk Types (OBJ 00:03:00 Duration
Lecture 5 Risk Handling (OBJ 00:08:30 Duration
Lecture 6 Risk Tracking (OBJ 00:05:04 Duration
Lecture 7 Risk Assessment (OBJ 00:17:57 Duration
Lecture 8 When Risk Management Fails (OBJ 00:03:41 Duration

Section 4 : Policies and Frameworks (Domain 4)

Lecture 1 Policies and Frameworks (OBJ 00:01:20 Duration
Lecture 2 Policies (OBJ 00:11:57 Duration
Lecture 3 Frameworks (OBJ 00:05:04 Duration
Lecture 4 Regulations (OBJ 00:08:05 Duration
Lecture 5 Standards (OBJ 00:06:08 Duration
Lecture 6 Contracts and Agreements (OBJ 00:09:20 Duration
Lecture 7 Legal Considerations (OBJ 00:07:00 Duration
Lecture 8 Integrating Industries (OBJ 00:03:25 Duration

Section 5 : Business Continuity (Domain 4)

Lecture 1 Business Continuity (OBJ 4 00:01:08 Duration
Lecture 2 Business Continuity Plan (OBJ 4 00:13:39 Duration
Lecture 3 Business Impact Analysis (OBJ 4 00:13:49 Duration
Lecture 4 Privacy Impact Assessment (OBJ 4 00:03:50 Duration
Lecture 5 Incident Response Plan (OBJ 4 00:10:55 Duration
Lecture 6 Testing Plans (OBJ 4 00:07:07 Duration

Section 6 : Risk Strategies (Domain 4)

Lecture 1 Risk Strategies (OBJ 4 00:01:29 Duration
Lecture 2 Asset Value (OBJ 4 00:04:01 Duration
Lecture 3 Access Control (OBJ 4 00:06:17 Duration
Lecture 4 Aggregating Risk (OBJ 4 00:03:04 Duration
Lecture 5 Scenario Planning (OBJ 4 00:08:18 Duration
Lecture 6 Security Controls (OBJ 4 00:09:13 Duration
Lecture 7 Security Solutions (OBJ 4 00:08:51 Duration
Lecture 8 Cost of a Data Breach (OBJ 4 00:05:59 Duration

Section 7 : Vendor Risk (Domain 4)

Lecture 1 Vendor Risk (OBJ 4 00:03:58 Duration
Lecture 2 Business Models (OBJ 4 00:11:01 Duration
Lecture 3 Influences (OBJ 4 00:07:22 Duration
Lecture 4 Organizational Changes (OBJ 4 00:06:07 Duration
Lecture 5 Shared Responsibility Model (OBJ 4 00:04:47 Duration
Lecture 6 Viability and Support (OBJ 4 00:10:47 Duration
Lecture 7 Dependencies (OBJ 4 00:04:36 Duration
Lecture 8 Considerations (OBJ 4 00:10:32 Duration
Lecture 9 Supply Chain (OBJ 4 00:05:56 Duration

Section 8 : Securing Networks (Domain 1)

Lecture 1 Securing Networks (OBJ 1 00:06:45 Duration
Lecture 2 Switches (OBJ 1 00:07:23 Duration
Lecture 3 Routers (OBJ 1 00:08:23 Duration
Lecture 4 Wireless and Mesh (OBJ 1 00:03:20 Duration
Lecture 5 Firewalls (OBJ 1 00:11:27 Duration
Lecture 6 Configuring Firewalls (OBJ 1 00:06:43 Duration
Lecture 7 Proxies (OBJ 1 00:07:09 Duration
Lecture 8 Gateways (OBJ 1 00:04:36 Duration
Lecture 9 IDS and IPS (OBJ 1 00:06:25 Duration
Lecture 10 Network Access Control (NAC) (OBJ 1 00:02:53 Duration
Lecture 11 Remote Access (OBJ 1 00:08:56 Duration
Lecture 12 Unified Communications (OBJ 1 00:19:05 Duration
Lecture 13 Cloud vs On-premise (OBJ 1 00:04:46 Duration
Lecture 14 DNSSEC (OBJ 1 00:04:12 Duration
Lecture 15 Load Balancer (OBJ 1 00:06:44 Duration

Section 9 : Securing Architectures (Domain 1)

Lecture 1 Securing Architectures (OBJ 1
Lecture 2 Traffic Mirroring (OBJ 1 00:04:20 Duration
Lecture 3 Network Sensors (OBJ 1 00:11:42 Duration
Lecture 4 Host Sensors (OBJ 1 00:06:12 Duration
Lecture 5 Layer 2 Segmentation (OBJ 1 00:05:11 Duration
Lecture 6 Network Segmentation (OBJ 1 00:13:10 Duration
Lecture 7 Implement Network Segmentation (OBJ 1 00:10:03 Duration
Lecture 8 Server Segmentation (OBJ 1 00:10:49 Duration
Lecture 9 Zero Trust (OBJ 1 00:06:34 Duration
Lecture 10 Merging Networks (OBJ 1 00:05:29 Duration
Lecture 11 Software-Defined Networking (SDN) (OBJ 1 00:05:24 Duration

Section 10 : Infrastructure Design (Domain 1)

Lecture 1 Infrastructure Design (OBJ 1 00:01:05 Duration
Lecture 2 Scalability (OBJ 1 00:05:36 Duration
Lecture 3 Resiliency Issues (OBJ 1 00:12:45 Duration
Lecture 4 Automation (OBJ 1 00:06:22 Duration
Lecture 5 Performance Design (OBJ 1 00:05:59 Duration
Lecture 6 Virtualization (OBJ 1 00:08:15 Duration
Lecture 7 Securing VMs (OBJ 1 00:04:41 Duration
Lecture 8 Containerization (OBJ 1 00:05:45 Duration

Section 11 : Cloud and Virtualization (Domain 1)

Lecture 1 Cloud and Virtualization (OBJ 1 00:01:03 Duration
Lecture 2 Cloud Deployment Models (OBJ 1 00:04:30 Duration
Lecture 3 Cloud Service Models (OBJ 1 00:05:03 Duration
Lecture 4 Deployment Considerations (OBJ 1 00:04:54 Duration
Lecture 5 Provider Limitations (OBJ 1 00:02:56 Duration
Lecture 6 Extending Controls (OBJ 1 00:05:03 Duration
Lecture 7 Provision and Deprovision (OBJ 1 00:02:56 Duration
Lecture 8 Storage Models (OBJ 1 00:05:19 Duration
Lecture 9 Virtualization (OBJ 1 00:07:52 Duration

Section 12 : Software Applications (Domain 1)

Lecture 1 Software Applications (OBJ 1 00:02:39 Duration
Lecture 2 Systems Development Life Cycle (OBJ 1 00:06:33 Duration
Lecture 3 Software Development Life Cycle (OBJ 1
Lecture 4 Development Approaches (OBJ 1 00:10:47 Duration
Lecture 5 Software Assurance (OBJ 1 00:08:53 Duration
Lecture 6 Baselins and Templates (OBJ 1 00:06:27 Duration
Lecture 7 Best Practices (OBJ 1 00:06:04 Duration
Lecture 8 Integrating Applications (OBJ 1 00:04:28 Duration

Section 13 : Data Security (Domain 1)

Lecture 1 Data Security (OBJ 1 00:03:33 Duration
Lecture 2 Data Life Cycle (OBJ 1 00:10:26 Duration
Lecture 3 Data Classification (OBJ 1 00:06:52 Duration
Lecture 4 Labeling and Tagging (OBJ 1 00:08:08 Duration
Lecture 5 Deidentification (OBJ 1 00:11:00 Duration
Lecture 6 Data Encryption (OBJ 1 00:07:29 Duration
Lecture 7 Data Loss Prevention (DLP) (OBJ 1 00:09:57 Duration
Lecture 8 DLP Detection (OBJ 1 00:06:38 Duration
Lecture 9 Data Loss Detection (OBJ 1 00:11:31 Duration
Lecture 10 Auditing Files (OBJ 1 00:03:53 Duration

Section 14 : Authentication and Authorization (Domain 1)

Lecture 1 Authentication and Authorization (OBJ 1
Lecture 2 Access Control (OBJ 1 00:04:43 Duration
Lecture 3 Credential Management (OBJ 1 00:04:24 Duration
Lecture 4 Password Policies (OBJ 1 00:07:58 Duration
Lecture 5 Implementing Password Policies (OBJ 1 00:04:34 Duration
Lecture 6 Cracking Weak Passwords (OBJ 1 00:02:32 Duration
Lecture 7 Multifactor Authentication (OBJ 1 00:08:22 Duration
Lecture 8 Authentication Protocols (OBJ 1 00:09:57 Duration
Lecture 9 Federation (OBJ 1 00:06:59 Duration
Lecture 10 Root of Trust (OBJ 1 00:04:21 Duration
Lecture 11 Attestation (OBJ 1 00:02:11 Duration
Lecture 12 Identity Proofing (OBJ 1 00:03:30 Duration

Section 15 : Cryptography (Domain 1)

Lecture 1 Cryptography (OBJ 1 00:01:45 Duration
Lecture 2 Privacy and Confidentiality (OBJ 1 00:06:28 Duration
Lecture 3 Integrity and Non-repudiation (OBJ 1 00:06:27 Duration
Lecture 4 Compliance and Policy (OBJ 1 00:03:29 Duration
Lecture 5 Data States (OBJ 1 00:06:59 Duration
Lecture 6 Cryptographic Use Cases (OBJ 1 00:06:14 Duration
Lecture 7 PKI Use Cases (OBJ 1 00:08:38 Duration

Section 16 : Emerging Technology (Domain 1)

Lecture 1 Emerging Technology (OBJ 1 00:04:14 Duration
Lecture 2 Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1 00:08:52 Duration
Lecture 3 Deep Learning (OBJ 1 00:08:54 Duration
Lecture 4 Big Data (OBJ 1 00:04:37 Duration
Lecture 5 Blockchain & Distributed Consensus (OBJ 1 00:05:33 Duration
Lecture 6 Passwordless Authentication (OBJ 1 00:05:14 Duration
Lecture 7 Homomorphic Encryption (OBJ 1 00:03:33 Duration
Lecture 8 VirtualAugmented Reality (OBJ 1 00:04:28 Duration
Lecture 9 3D Printing (OBJ 1 00:03:00 Duration
Lecture 10 Quantum Computing (OBJ 1 00:05:31 Duration

Section 17 : Enterprise Mobility (Domain 3)

Lecture 1 Enterprise Mobility 00:02:33 Duration
Lecture 2 Enterprise Mobility Management (EMM) (OBJ 00:09:33 Duration
Lecture 3 WPA3 (OBJ 00:07:17 Duration
Lecture 4 Connectivity Options (OBJ 00:08:45 Duration
Lecture 5 Security Configurations (OBJ 00:08:05 Duration
Lecture 6 DNS Protection (OBJ 00:03:12 Duration
Lecture 7 Deployment Options (OBJ 00:04:35 Duration
Lecture 8 Reconnaissance Concerns (OBJ 00:07:57 Duration
Lecture 9 Mobile Security (OBJ 00:07:47 Duration

Section 18 : Endpoint Security Controls (Domain 3)

Lecture 1 Endpoint Security Controls 00:02:21 Duration
Lecture 2 Device Hardening (OBJ 00:08:26 Duration
Lecture 3 Unnecessary Services (OBJ 00:05:35 Duration
Lecture 4 Patching (OBJ 00:04:38 Duration
Lecture 5 Security Settings (OBJ 00:05:38 Duration
Lecture 6 Mandatory Access Controls (MAC) (OBJ 00:06:41 Duration
Lecture 7 Secure Boot (OBJ 00:05:45 Duration
Lecture 8 Hardware Encryption (OBJ 00:04:45 Duration
Lecture 9 Endpoint Protections (OBJ 00:09:51 Duration
Lecture 10 Logging and Monitoring (OBJ 00:06:11 Duration
Lecture 11 Configuring SIEM Agents (OBJ 00:19:26 Duration
Lecture 12 Resiliency (OBJ 00:06:01 Duration

Section 19 : Cloud Technologies (Domain 3)

Lecture 1 Cloud Technologies 00:02:34 Duration
Lecture 2 Business ContinuityDisaster Recovery (BCDR) (OBJ 00:07:48 Duration
Lecture 3 Cloud Encryption (OBJ 00:05:19 Duration
Lecture 4 Serverless Computing (OBJ 00:08:51 Duration
Lecture 5 Software-Defied Networking (SDN) (OBJ 00:06:49 Duration
Lecture 6 Log Collection and Analysis (OBJ 00:04:19 Duration
Lecture 7 Cloud Access Security Broker (CASB) (OBJ 00:06:13 Duration
Lecture 8 Cloud Misconfigurations (OBJ 00:10:53 Duration

Section 20 : Operational Technologies (Domain 3)

Lecture 1 Operational Technologies 00:02:02 Duration
Lecture 2 Embedded Systems (OBJ 00:10:25 Duration
Lecture 3 ICS and SCADA (OBJ 00:09:15 Duration
Lecture 4 ICS Protocols (OBJ 00:10:51 Duration
Lecture 5 Industries and Sectors (OBJ 00:04:45 Duration

Section 21 : Hashing and Symmetric Algorithms (Domain 3)

Lecture 1 Hashing and Symmetric Algorithms 00:01:10 Duration
Lecture 2 Hashing (OBJ 00:06:51 Duration
Lecture 3 Calculating Hash Digests (OBJ 00:03:04 Duration
Lecture 4 Message Authentication (OBJ 00:03:30 Duration
Lecture 5 Symmetric Algorithms (OBJ 00:05:40 Duration
Lecture 6 Stream Ciphers (OBJ 00:04:29 Duration
Lecture 7 Block Ciphers (OBJ 00:09:58 Duration

Section 22 : Asymmetric Algorithms (Domain 3)

Lecture 1 Asymmetric Algorithms 00:02:09 Duration
Lecture 2 Using Asymmetric Algortihms 00:09:25 Duration
Lecture 3 SSLTLS and Cipher Suites (OBJ 00:08:18 Duration
Lecture 4 SMIME and SSH (OBJ 00:07:24 Duration
Lecture 5 EAP (OBJ 00:05:36 Duration
Lecture 6 IPSec (OBJ 00:14:31 Duration
Lecture 7 Elliptic Curve Cryptography (ECC) (OBJ 00:03:30 Duration
Lecture 8 Forward Secrecy (OBJ 00:03:32 Duration
Lecture 9 Authenticated Encryption with Associated Data (AEAD) (OBJ 00:01:49 Duration
Lecture 10 Key Stretching (OBJ 00:04:26 Duration

Section 23 : Public Key Infrastructure (Domain 3)

Lecture 1 Public Key Infrastructure 00:02:47 Duration
Lecture 2 PKI Components (OBJ 00:10:15 Duration
Lecture 3 Digital Certificates (OBJ 00:07:41 Duration
Lecture 4 Using Digital Certificates (OBJ 00:05:36 Duration
Lecture 5 Exploring Server Certificates (OBJ 00:03:31 Duration
Lecture 6 Trust Models (OBJ 00:04:26 Duration
Lecture 7 Certificate Management (OBJ 00:02:40 Duration
Lecture 8 Certificate Validity (CRL and OCSP) (OBJ 00:03:45 Duration
Lecture 9 Protecting Web Traffic (OBJ 00:03:27 Duration
Lecture 10 Troubleshooting Certificates (OBJ 00:05:19 Duration
Lecture 11 Troubleshooting Keys (OBJ 00:03:31 Duration

Section 24 : Threat and Vulnerability Management (Domain 2)

Lecture 1 Threat and Vulnerability Management 00:01:53 Duration
Lecture 2 Threat Intelligence (OBJ 00:06:16 Duration
Lecture 3 Threat Hunting (OBJ 00:06:40 Duration
Lecture 4 Intelligence Collection (OBJ 00:11:05 Duration
Lecture 5 Threat Actors (OBJ 00:09:18 Duration
Lecture 6 Threat Management Frameworks (OBJ 00:12:42 Duration
Lecture 7 Vulnerability Management Activities (OBJ 00:11:42 Duration
Lecture 8 Security Content Automation Protocol (SCAP) (OBJ 00:07:18 Duration

Section 25 : Vulnerability Assessments (Domain 2)

Lecture 1 Vulnerability Assessments 00:01:32 Duration
Lecture 2 Penetration Test (OBJ 00:04:46 Duration
Lecture 3 PenTest Steps (OBJ 00:06:59 Duration
Lecture 4 PenTest Requirements (OBJ 00:11:21 Duration
Lecture 5 Code Analysis (OBJ 00:08:26 Duration
Lecture 6 Protocol Analysis (OBJ 00:07:49 Duration
Lecture 7 TCPDump (OBJ 00:07:47 Duration
Lecture 8 Wireshark (OBJ 00:09:40 Duration
Lecture 9 Nmap (OBJ 00:10:35 Duration
Lecture 10 Analysis Utilities (OBJ 00:05:16 Duration
Lecture 11 Vulnerability Scanning (OBJ 00:09:24 Duration
Lecture 12 Analyzing Scan Outputs (OBJ 00:13:32 Duration

Section 26 : Risk Reduction (Domain 2)

Lecture 1 Risk Reduction 00:01:29 Duration
Lecture 2 Deceptive Technologies (OBJ 00:04:58 Duration
Lecture 3 Security Data Analytics (OBJ 00:08:01 Duration
Lecture 4 Preventative Controls (OBJ 00:05:07 Duration
Lecture 5 Application Controls (OBJ 00:09:38 Duration
Lecture 6 Security Automation (OBJ 00:10:39 Duration
Lecture 7 Physical Security (OBJ 00:11:41 Duration
Lecture 8 Lock Picking (OBJ 00:01:37 Duration

Section 27 : Analyzing Vulnerabilities (Domain 2)

Lecture 1 Analyzing Vulnerabilities 00:01:19 Duration
Lecture 2 Race Conditions (OBJ 00:04:55 Duration
Lecture 3 Buffer Overflows (OBJ 00:12:23 Duration
Lecture 4 Buffer Overflow Attack (OBJ 00:06:24 Duration
Lecture 5 Authentication and References (OBJ 00:02:30 Duration
Lecture 6 Ciphers and Certificates (OBJ 00:10:42 Duration
Lecture 7 Improper Headers (OBJ 00:06:06 Duration
Lecture 8 Software Composition (OBJ 00:09:46 Duration
Lecture 9 Vulnerable Web Applications (OBJ 00:11:41 Duration

Section 28 : Attacking Vulnerabilities (Domain 2)

Lecture 1 Attacking Vulnerabilities 00:01:12 Duration
Lecture 2 Directory Traversals (OBJ 00:09:45 Duration
Lecture 3 Cross-Site Scripting (XSS) (OBJ 00:08:56 Duration
Lecture 4 Cross-Site Request Forgery (CSRF) (OBJ 00:07:12 Duration
Lecture 5 SQL Injections (OBJ 00:07:02 Duration
Lecture 6 XML Injections (OBJ 00:06:26 Duration
Lecture 7 Other Injection Attacks (OBJ 00:04:18 Duration
Lecture 8 Authentication Bypass (OBJ
Lecture 9 Web Application Vulnerabilities (OBJ 00:08:38 Duration
Lecture 10 VM Attacks (OBJ 00:04:49 Duration
Lecture 11 Network Attacks (OBJ 00:11:00 Duration
Lecture 12 Analyzing Web Applications (OBJ 00:15:40 Duration
Lecture 13 Social Engineering (OBJ 00:07:11 Duration
Lecture 14 Phishing Campaigns (OBJ 00:05:19 Duration

Section 29 : Indicators of Compromise (Domain 2)

Lecture 1 Indicators of Compromise 00:01:46 Duration
Lecture 2 Types of IoCs (OBJ 00:03:52 Duration
Lecture 3 PCAP Files (OBJ 00:04:13 Duration
Lecture 4 Conduct Packet Analysis (OBJ 00:06:00 Duration
Lecture 5 NetFlow (OBJ 00:07:04 Duration
Lecture 6 Logs (OBJ
Lecture 7 IoC Notifications (OBJ 00:07:37 Duration
Lecture 8 Response to IoCs (OBJ 00:05:12 Duration
Lecture 9 Security Appliances (OBJ 00:15:40 Duration

Section 30 : Incident Response (Domain 2)

Lecture 1 Incident Response 00:01:23 Duration
Lecture 2 Triage (OBJ 00:08:00 Duration
Lecture 3 Communication Plan (OBJ 00:10:03 Duration
Lecture 4 Stakeholder Management (OBJ 00:07:08 Duration
Lecture 5 Incident Response Process (OBJ 00:10:19 Duration
Lecture 6 Playbooks (OBJ 00:08:24 Duration

Section 31 : Digital Forensics (Domain 2)

Lecture 1 Digital Forensics 00:01:01 Duration
Lecture 2 Forensic Process (OBJ 00:04:35 Duration
Lecture 3 Chain of Custody (OBJ 00:07:03 Duration
Lecture 4 Order of Volatility (OBJ 00:06:28 Duration
Lecture 5 Forensic Analysis (OBJ 00:06:37 Duration
Lecture 6 Steganography 00:03:43 Duration

Section 32 : Digital Forensic Tools (Domain 2)

Lecture 1 Digital Forensic Tools 00:02:19 Duration
Lecture 2 Forensic Workstations (OBJ 00:05:08 Duration
Lecture 3 File Carving Tools (OBJ 00:03:33 Duration
Lecture 4 Binary Analysis Tools (OBJ 00:07:08 Duration
Lecture 5 Performing Malware Analysis (OBJ 00:25:19 Duration
Lecture 6 Forensic Analysis Tools (OBJ 00:08:08 Duration
Lecture 7 Using Aircrack-ng (OBJ 00:07:45 Duration
Lecture 8 Imaging Tools (OBJ 00:07:45 Duration
Lecture 9 Collecting and Validating Evidence (OBJ 00:09:02 Duration
Lecture 10 About Certification
Lecture 11 Using Collection Tools (OBJ 00:04:27 Duration