Section 1 : Introduction
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 2 | Download Your Free Study Guide |
Section 2 : Data Considerations (Domain 4)
|
Lecture 1 | Data Considerations (OBJ 4 | 00:00:54 Duration |
|
Lecture 2 | Data Security (OBJ | 00:03:41 Duration |
|
Lecture 3 | Data Classification (OBJ | 00:02:44 Duration |
|
Lecture 4 | Data Types (OBJ | 00:05:21 Duration |
|
Lecture 5 | Data Retention (OBJ | 00:06:52 Duration |
|
Lecture 6 | Data Destruction (OBJ | 00:02:52 Duration |
|
Lecture 7 | Data Ownership (OBJ | 00:05:31 Duration |
|
Lecture 8 | Data Sovereignty (OBJ | 00:03:14 Duration |
Section 3 : Risk Management (Domain 4)
|
Lecture 1 | Risk Management (OBJ 4 | 00:01:27 Duration |
|
Lecture 2 | Risk Strategies (OBJ | 00:04:27 Duration |
|
Lecture 3 | Risk Management Lifecycle (OBJ | 00:11:49 Duration |
|
Lecture 4 | Risk Types (OBJ | 00:03:00 Duration |
|
Lecture 5 | Risk Handling (OBJ | 00:08:30 Duration |
|
Lecture 6 | Risk Tracking (OBJ | 00:05:04 Duration |
|
Lecture 7 | Risk Assessment (OBJ | 00:17:57 Duration |
|
Lecture 8 | When Risk Management Fails (OBJ | 00:03:41 Duration |
Section 4 : Policies and Frameworks (Domain 4)
|
Lecture 1 | Policies and Frameworks (OBJ | 00:01:20 Duration |
|
Lecture 2 | Policies (OBJ | 00:11:57 Duration |
|
Lecture 3 | Frameworks (OBJ | 00:05:04 Duration |
|
Lecture 4 | Regulations (OBJ | 00:08:05 Duration |
|
Lecture 5 | Standards (OBJ | 00:06:08 Duration |
|
Lecture 6 | Contracts and Agreements (OBJ | 00:09:20 Duration |
|
Lecture 7 | Legal Considerations (OBJ | 00:07:00 Duration |
|
Lecture 8 | Integrating Industries (OBJ | 00:03:25 Duration |
Section 5 : Business Continuity (Domain 4)
|
Lecture 1 | Business Continuity (OBJ 4 | 00:01:08 Duration |
|
Lecture 2 | Business Continuity Plan (OBJ 4 | 00:13:39 Duration |
|
Lecture 3 | Business Impact Analysis (OBJ 4 | 00:13:49 Duration |
|
Lecture 4 | Privacy Impact Assessment (OBJ 4 | 00:03:50 Duration |
|
Lecture 5 | Incident Response Plan (OBJ 4 | 00:10:55 Duration |
|
Lecture 6 | Testing Plans (OBJ 4 | 00:07:07 Duration |
Section 6 : Risk Strategies (Domain 4)
|
Lecture 1 | Risk Strategies (OBJ 4 | 00:01:29 Duration |
|
Lecture 2 | Asset Value (OBJ 4 | 00:04:01 Duration |
|
Lecture 3 | Access Control (OBJ 4 | 00:06:17 Duration |
|
Lecture 4 | Aggregating Risk (OBJ 4 | 00:03:04 Duration |
|
Lecture 5 | Scenario Planning (OBJ 4 | 00:08:18 Duration |
|
Lecture 6 | Security Controls (OBJ 4 | 00:09:13 Duration |
|
Lecture 7 | Security Solutions (OBJ 4 | 00:08:51 Duration |
|
Lecture 8 | Cost of a Data Breach (OBJ 4 | 00:05:59 Duration |
Section 7 : Vendor Risk (Domain 4)
|
Lecture 1 | Vendor Risk (OBJ 4 | 00:03:58 Duration |
|
Lecture 2 | Business Models (OBJ 4 | 00:11:01 Duration |
|
Lecture 3 | Influences (OBJ 4 | 00:07:22 Duration |
|
Lecture 4 | Organizational Changes (OBJ 4 | 00:06:07 Duration |
|
Lecture 5 | Shared Responsibility Model (OBJ 4 | 00:04:47 Duration |
|
Lecture 6 | Viability and Support (OBJ 4 | 00:10:47 Duration |
|
Lecture 7 | Dependencies (OBJ 4 | 00:04:36 Duration |
|
Lecture 8 | Considerations (OBJ 4 | 00:10:32 Duration |
|
Lecture 9 | Supply Chain (OBJ 4 | 00:05:56 Duration |
Section 8 : Securing Networks (Domain 1)
|
Lecture 1 | Securing Networks (OBJ 1 | 00:06:45 Duration |
|
Lecture 2 | Switches (OBJ 1 | 00:07:23 Duration |
|
Lecture 3 | Routers (OBJ 1 | 00:08:23 Duration |
|
Lecture 4 | Wireless and Mesh (OBJ 1 | 00:03:20 Duration |
|
Lecture 5 | Firewalls (OBJ 1 | 00:11:27 Duration |
|
Lecture 6 | Configuring Firewalls (OBJ 1 | 00:06:43 Duration |
|
Lecture 7 | Proxies (OBJ 1 | 00:07:09 Duration |
|
Lecture 8 | Gateways (OBJ 1 | 00:04:36 Duration |
|
Lecture 9 | IDS and IPS (OBJ 1 | 00:06:25 Duration |
|
Lecture 10 | Network Access Control (NAC) (OBJ 1 | 00:02:53 Duration |
|
Lecture 11 | Remote Access (OBJ 1 | 00:08:56 Duration |
|
Lecture 12 | Unified Communications (OBJ 1 | 00:19:05 Duration |
|
Lecture 13 | Cloud vs On-premise (OBJ 1 | 00:04:46 Duration |
|
Lecture 14 | DNSSEC (OBJ 1 | 00:04:12 Duration |
|
Lecture 15 | Load Balancer (OBJ 1 | 00:06:44 Duration |
Section 9 : Securing Architectures (Domain 1)
|
Lecture 1 | Securing Architectures (OBJ 1 | |
|
Lecture 2 | Traffic Mirroring (OBJ 1 | 00:04:20 Duration |
|
Lecture 3 | Network Sensors (OBJ 1 | 00:11:42 Duration |
|
Lecture 4 | Host Sensors (OBJ 1 | 00:06:12 Duration |
|
Lecture 5 | Layer 2 Segmentation (OBJ 1 | 00:05:11 Duration |
|
Lecture 6 | Network Segmentation (OBJ 1 | 00:13:10 Duration |
|
Lecture 7 | Implement Network Segmentation (OBJ 1 | 00:10:03 Duration |
|
Lecture 8 | Server Segmentation (OBJ 1 | 00:10:49 Duration |
|
Lecture 9 | Zero Trust (OBJ 1 | 00:06:34 Duration |
|
Lecture 10 | Merging Networks (OBJ 1 | 00:05:29 Duration |
|
Lecture 11 | Software-Defined Networking (SDN) (OBJ 1 | 00:05:24 Duration |
Section 10 : Infrastructure Design (Domain 1)
|
Lecture 1 | Infrastructure Design (OBJ 1 | 00:01:05 Duration |
|
Lecture 2 | Scalability (OBJ 1 | 00:05:36 Duration |
|
Lecture 3 | Resiliency Issues (OBJ 1 | 00:12:45 Duration |
|
Lecture 4 | Automation (OBJ 1 | 00:06:22 Duration |
|
Lecture 5 | Performance Design (OBJ 1 | 00:05:59 Duration |
|
Lecture 6 | Virtualization (OBJ 1 | 00:08:15 Duration |
|
Lecture 7 | Securing VMs (OBJ 1 | 00:04:41 Duration |
|
Lecture 8 | Containerization (OBJ 1 | 00:05:45 Duration |
Section 11 : Cloud and Virtualization (Domain 1)
|
Lecture 1 | Cloud and Virtualization (OBJ 1 | 00:01:03 Duration |
|
Lecture 2 | Cloud Deployment Models (OBJ 1 | 00:04:30 Duration |
|
Lecture 3 | Cloud Service Models (OBJ 1 | 00:05:03 Duration |
|
Lecture 4 | Deployment Considerations (OBJ 1 | 00:04:54 Duration |
|
Lecture 5 | Provider Limitations (OBJ 1 | 00:02:56 Duration |
|
Lecture 6 | Extending Controls (OBJ 1 | 00:05:03 Duration |
|
Lecture 7 | Provision and Deprovision (OBJ 1 | 00:02:56 Duration |
|
Lecture 8 | Storage Models (OBJ 1 | 00:05:19 Duration |
|
Lecture 9 | Virtualization (OBJ 1 | 00:07:52 Duration |
Section 12 : Software Applications (Domain 1)
|
Lecture 1 | Software Applications (OBJ 1 | 00:02:39 Duration |
|
Lecture 2 | Systems Development Life Cycle (OBJ 1 | 00:06:33 Duration |
|
Lecture 3 | Software Development Life Cycle (OBJ 1 | |
|
Lecture 4 | Development Approaches (OBJ 1 | 00:10:47 Duration |
|
Lecture 5 | Software Assurance (OBJ 1 | 00:08:53 Duration |
|
Lecture 6 | Baselins and Templates (OBJ 1 | 00:06:27 Duration |
|
Lecture 7 | Best Practices (OBJ 1 | 00:06:04 Duration |
|
Lecture 8 | Integrating Applications (OBJ 1 | 00:04:28 Duration |
Section 13 : Data Security (Domain 1)
|
Lecture 1 | Data Security (OBJ 1 | 00:03:33 Duration |
|
Lecture 2 | Data Life Cycle (OBJ 1 | 00:10:26 Duration |
|
Lecture 3 | Data Classification (OBJ 1 | 00:06:52 Duration |
|
Lecture 4 | Labeling and Tagging (OBJ 1 | 00:08:08 Duration |
|
Lecture 5 | Deidentification (OBJ 1 | 00:11:00 Duration |
|
Lecture 6 | Data Encryption (OBJ 1 | 00:07:29 Duration |
|
Lecture 7 | Data Loss Prevention (DLP) (OBJ 1 | 00:09:57 Duration |
|
Lecture 8 | DLP Detection (OBJ 1 | 00:06:38 Duration |
|
Lecture 9 | Data Loss Detection (OBJ 1 | 00:11:31 Duration |
|
Lecture 10 | Auditing Files (OBJ 1 | 00:03:53 Duration |
Section 14 : Authentication and Authorization (Domain 1)
|
Lecture 1 | Authentication and Authorization (OBJ 1 | |
|
Lecture 2 | Access Control (OBJ 1 | 00:04:43 Duration |
|
Lecture 3 | Credential Management (OBJ 1 | 00:04:24 Duration |
|
Lecture 4 | Password Policies (OBJ 1 | 00:07:58 Duration |
|
Lecture 5 | Implementing Password Policies (OBJ 1 | 00:04:34 Duration |
|
Lecture 6 | Cracking Weak Passwords (OBJ 1 | 00:02:32 Duration |
|
Lecture 7 | Multifactor Authentication (OBJ 1 | 00:08:22 Duration |
|
Lecture 8 | Authentication Protocols (OBJ 1 | 00:09:57 Duration |
|
Lecture 9 | Federation (OBJ 1 | 00:06:59 Duration |
|
Lecture 10 | Root of Trust (OBJ 1 | 00:04:21 Duration |
|
Lecture 11 | Attestation (OBJ 1 | 00:02:11 Duration |
|
Lecture 12 | Identity Proofing (OBJ 1 | 00:03:30 Duration |
Section 15 : Cryptography (Domain 1)
|
Lecture 1 | Cryptography (OBJ 1 | 00:01:45 Duration |
|
Lecture 2 | Privacy and Confidentiality (OBJ 1 | 00:06:28 Duration |
|
Lecture 3 | Integrity and Non-repudiation (OBJ 1 | 00:06:27 Duration |
|
Lecture 4 | Compliance and Policy (OBJ 1 | 00:03:29 Duration |
|
Lecture 5 | Data States (OBJ 1 | 00:06:59 Duration |
|
Lecture 6 | Cryptographic Use Cases (OBJ 1 | 00:06:14 Duration |
|
Lecture 7 | PKI Use Cases (OBJ 1 | 00:08:38 Duration |
Section 16 : Emerging Technology (Domain 1)
|
Lecture 1 | Emerging Technology (OBJ 1 | 00:04:14 Duration |
|
Lecture 2 | Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1 | 00:08:52 Duration |
|
Lecture 3 | Deep Learning (OBJ 1 | 00:08:54 Duration |
|
Lecture 4 | Big Data (OBJ 1 | 00:04:37 Duration |
|
Lecture 5 | Blockchain & Distributed Consensus (OBJ 1 | 00:05:33 Duration |
|
Lecture 6 | Passwordless Authentication (OBJ 1 | 00:05:14 Duration |
|
Lecture 7 | Homomorphic Encryption (OBJ 1 | 00:03:33 Duration |
|
Lecture 8 | VirtualAugmented Reality (OBJ 1 | 00:04:28 Duration |
|
Lecture 9 | 3D Printing (OBJ 1 | 00:03:00 Duration |
|
Lecture 10 | Quantum Computing (OBJ 1 | 00:05:31 Duration |
Section 17 : Enterprise Mobility (Domain 3)
|
Lecture 1 | Enterprise Mobility | 00:02:33 Duration |
|
Lecture 2 | Enterprise Mobility Management (EMM) (OBJ | 00:09:33 Duration |
|
Lecture 3 | WPA3 (OBJ | 00:07:17 Duration |
|
Lecture 4 | Connectivity Options (OBJ | 00:08:45 Duration |
|
Lecture 5 | Security Configurations (OBJ | 00:08:05 Duration |
|
Lecture 6 | DNS Protection (OBJ | 00:03:12 Duration |
|
Lecture 7 | Deployment Options (OBJ | 00:04:35 Duration |
|
Lecture 8 | Reconnaissance Concerns (OBJ | 00:07:57 Duration |
|
Lecture 9 | Mobile Security (OBJ | 00:07:47 Duration |
Section 18 : Endpoint Security Controls (Domain 3)
|
Lecture 1 | Endpoint Security Controls | 00:02:21 Duration |
|
Lecture 2 | Device Hardening (OBJ | 00:08:26 Duration |
|
Lecture 3 | Unnecessary Services (OBJ | 00:05:35 Duration |
|
Lecture 4 | Patching (OBJ | 00:04:38 Duration |
|
Lecture 5 | Security Settings (OBJ | 00:05:38 Duration |
|
Lecture 6 | Mandatory Access Controls (MAC) (OBJ | 00:06:41 Duration |
|
Lecture 7 | Secure Boot (OBJ | 00:05:45 Duration |
|
Lecture 8 | Hardware Encryption (OBJ | 00:04:45 Duration |
|
Lecture 9 | Endpoint Protections (OBJ | 00:09:51 Duration |
|
Lecture 10 | Logging and Monitoring (OBJ | 00:06:11 Duration |
|
Lecture 11 | Configuring SIEM Agents (OBJ | 00:19:26 Duration |
|
Lecture 12 | Resiliency (OBJ | 00:06:01 Duration |
Section 19 : Cloud Technologies (Domain 3)
|
Lecture 1 | Cloud Technologies | 00:02:34 Duration |
|
Lecture 2 | Business ContinuityDisaster Recovery (BCDR) (OBJ | 00:07:48 Duration |
|
Lecture 3 | Cloud Encryption (OBJ | 00:05:19 Duration |
|
Lecture 4 | Serverless Computing (OBJ | 00:08:51 Duration |
|
Lecture 5 | Software-Defied Networking (SDN) (OBJ | 00:06:49 Duration |
|
Lecture 6 | Log Collection and Analysis (OBJ | 00:04:19 Duration |
|
Lecture 7 | Cloud Access Security Broker (CASB) (OBJ | 00:06:13 Duration |
|
Lecture 8 | Cloud Misconfigurations (OBJ | 00:10:53 Duration |
Section 20 : Operational Technologies (Domain 3)
|
Lecture 1 | Operational Technologies | 00:02:02 Duration |
|
Lecture 2 | Embedded Systems (OBJ | 00:10:25 Duration |
|
Lecture 3 | ICS and SCADA (OBJ | 00:09:15 Duration |
|
Lecture 4 | ICS Protocols (OBJ | 00:10:51 Duration |
|
Lecture 5 | Industries and Sectors (OBJ | 00:04:45 Duration |
Section 21 : Hashing and Symmetric Algorithms (Domain 3)
|
Lecture 1 | Hashing and Symmetric Algorithms | 00:01:10 Duration |
|
Lecture 2 | Hashing (OBJ | 00:06:51 Duration |
|
Lecture 3 | Calculating Hash Digests (OBJ | 00:03:04 Duration |
|
Lecture 4 | Message Authentication (OBJ | 00:03:30 Duration |
|
Lecture 5 | Symmetric Algorithms (OBJ | 00:05:40 Duration |
|
Lecture 6 | Stream Ciphers (OBJ | 00:04:29 Duration |
|
Lecture 7 | Block Ciphers (OBJ | 00:09:58 Duration |
Section 22 : Asymmetric Algorithms (Domain 3)
|
Lecture 1 | Asymmetric Algorithms | 00:02:09 Duration |
|
Lecture 2 | Using Asymmetric Algortihms | 00:09:25 Duration |
|
Lecture 3 | SSLTLS and Cipher Suites (OBJ | 00:08:18 Duration |
|
Lecture 4 | SMIME and SSH (OBJ | 00:07:24 Duration |
|
Lecture 5 | EAP (OBJ | 00:05:36 Duration |
|
Lecture 6 | IPSec (OBJ | 00:14:31 Duration |
|
Lecture 7 | Elliptic Curve Cryptography (ECC) (OBJ | 00:03:30 Duration |
|
Lecture 8 | Forward Secrecy (OBJ | 00:03:32 Duration |
|
Lecture 9 | Authenticated Encryption with Associated Data (AEAD) (OBJ | 00:01:49 Duration |
|
Lecture 10 | Key Stretching (OBJ | 00:04:26 Duration |
Section 23 : Public Key Infrastructure (Domain 3)
|
Lecture 1 | Public Key Infrastructure | 00:02:47 Duration |
|
Lecture 2 | PKI Components (OBJ | 00:10:15 Duration |
|
Lecture 3 | Digital Certificates (OBJ | 00:07:41 Duration |
|
Lecture 4 | Using Digital Certificates (OBJ | 00:05:36 Duration |
|
Lecture 5 | Exploring Server Certificates (OBJ | 00:03:31 Duration |
|
Lecture 6 | Trust Models (OBJ | 00:04:26 Duration |
|
Lecture 7 | Certificate Management (OBJ | 00:02:40 Duration |
|
Lecture 8 | Certificate Validity (CRL and OCSP) (OBJ | 00:03:45 Duration |
|
Lecture 9 | Protecting Web Traffic (OBJ | 00:03:27 Duration |
|
Lecture 10 | Troubleshooting Certificates (OBJ | 00:05:19 Duration |
|
Lecture 11 | Troubleshooting Keys (OBJ | 00:03:31 Duration |
Section 24 : Threat and Vulnerability Management (Domain 2)
|
Lecture 1 | Threat and Vulnerability Management | 00:01:53 Duration |
|
Lecture 2 | Threat Intelligence (OBJ | 00:06:16 Duration |
|
Lecture 3 | Threat Hunting (OBJ | 00:06:40 Duration |
|
Lecture 4 | Intelligence Collection (OBJ | 00:11:05 Duration |
|
Lecture 5 | Threat Actors (OBJ | 00:09:18 Duration |
|
Lecture 6 | Threat Management Frameworks (OBJ | 00:12:42 Duration |
|
Lecture 7 | Vulnerability Management Activities (OBJ | 00:11:42 Duration |
|
Lecture 8 | Security Content Automation Protocol (SCAP) (OBJ | 00:07:18 Duration |
Section 25 : Vulnerability Assessments (Domain 2)
|
Lecture 1 | Vulnerability Assessments | 00:01:32 Duration |
|
Lecture 2 | Penetration Test (OBJ | 00:04:46 Duration |
|
Lecture 3 | PenTest Steps (OBJ | 00:06:59 Duration |
|
Lecture 4 | PenTest Requirements (OBJ | 00:11:21 Duration |
|
Lecture 5 | Code Analysis (OBJ | 00:08:26 Duration |
|
Lecture 6 | Protocol Analysis (OBJ | 00:07:49 Duration |
|
Lecture 7 | TCPDump (OBJ | 00:07:47 Duration |
|
Lecture 8 | Wireshark (OBJ | 00:09:40 Duration |
|
Lecture 9 | Nmap (OBJ | 00:10:35 Duration |
|
Lecture 10 | Analysis Utilities (OBJ | 00:05:16 Duration |
|
Lecture 11 | Vulnerability Scanning (OBJ | 00:09:24 Duration |
|
Lecture 12 | Analyzing Scan Outputs (OBJ | 00:13:32 Duration |
Section 26 : Risk Reduction (Domain 2)
|
Lecture 1 | Risk Reduction | 00:01:29 Duration |
|
Lecture 2 | Deceptive Technologies (OBJ | 00:04:58 Duration |
|
Lecture 3 | Security Data Analytics (OBJ | 00:08:01 Duration |
|
Lecture 4 | Preventative Controls (OBJ | 00:05:07 Duration |
|
Lecture 5 | Application Controls (OBJ | 00:09:38 Duration |
|
Lecture 6 | Security Automation (OBJ | 00:10:39 Duration |
|
Lecture 7 | Physical Security (OBJ | 00:11:41 Duration |
|
Lecture 8 | Lock Picking (OBJ | 00:01:37 Duration |
Section 27 : Analyzing Vulnerabilities (Domain 2)
|
Lecture 1 | Analyzing Vulnerabilities | 00:01:19 Duration |
|
Lecture 2 | Race Conditions (OBJ | 00:04:55 Duration |
|
Lecture 3 | Buffer Overflows (OBJ | 00:12:23 Duration |
|
Lecture 4 | Buffer Overflow Attack (OBJ | 00:06:24 Duration |
|
Lecture 5 | Authentication and References (OBJ | 00:02:30 Duration |
|
Lecture 6 | Ciphers and Certificates (OBJ | 00:10:42 Duration |
|
Lecture 7 | Improper Headers (OBJ | 00:06:06 Duration |
|
Lecture 8 | Software Composition (OBJ | 00:09:46 Duration |
|
Lecture 9 | Vulnerable Web Applications (OBJ | 00:11:41 Duration |
Section 28 : Attacking Vulnerabilities (Domain 2)
|
Lecture 1 | Attacking Vulnerabilities | 00:01:12 Duration |
|
Lecture 2 | Directory Traversals (OBJ | 00:09:45 Duration |
|
Lecture 3 | Cross-Site Scripting (XSS) (OBJ | 00:08:56 Duration |
|
Lecture 4 | Cross-Site Request Forgery (CSRF) (OBJ | 00:07:12 Duration |
|
Lecture 5 | SQL Injections (OBJ | 00:07:02 Duration |
|
Lecture 6 | XML Injections (OBJ | 00:06:26 Duration |
|
Lecture 7 | Other Injection Attacks (OBJ | 00:04:18 Duration |
|
Lecture 8 | Authentication Bypass (OBJ | |
|
Lecture 9 | Web Application Vulnerabilities (OBJ | 00:08:38 Duration |
|
Lecture 10 | VM Attacks (OBJ | 00:04:49 Duration |
|
Lecture 11 | Network Attacks (OBJ | 00:11:00 Duration |
|
Lecture 12 | Analyzing Web Applications (OBJ | 00:15:40 Duration |
|
Lecture 13 | Social Engineering (OBJ | 00:07:11 Duration |
|
Lecture 14 | Phishing Campaigns (OBJ | 00:05:19 Duration |
Section 29 : Indicators of Compromise (Domain 2)
|
Lecture 1 | Indicators of Compromise | 00:01:46 Duration |
|
Lecture 2 | Types of IoCs (OBJ | 00:03:52 Duration |
|
Lecture 3 | PCAP Files (OBJ | 00:04:13 Duration |
|
Lecture 4 | Conduct Packet Analysis (OBJ | 00:06:00 Duration |
|
Lecture 5 | NetFlow (OBJ | 00:07:04 Duration |
|
Lecture 6 | Logs (OBJ | |
|
Lecture 7 | IoC Notifications (OBJ | 00:07:37 Duration |
|
Lecture 8 | Response to IoCs (OBJ | 00:05:12 Duration |
|
Lecture 9 | Security Appliances (OBJ | 00:15:40 Duration |
Section 30 : Incident Response (Domain 2)
|
Lecture 1 | Incident Response | 00:01:23 Duration |
|
Lecture 2 | Triage (OBJ | 00:08:00 Duration |
|
Lecture 3 | Communication Plan (OBJ | 00:10:03 Duration |
|
Lecture 4 | Stakeholder Management (OBJ | 00:07:08 Duration |
|
Lecture 5 | Incident Response Process (OBJ | 00:10:19 Duration |
|
Lecture 6 | Playbooks (OBJ | 00:08:24 Duration |
Section 31 : Digital Forensics (Domain 2)
|
Lecture 1 | Digital Forensics | 00:01:01 Duration |
|
Lecture 2 | Forensic Process (OBJ | 00:04:35 Duration |
|
Lecture 3 | Chain of Custody (OBJ | 00:07:03 Duration |
|
Lecture 4 | Order of Volatility (OBJ | 00:06:28 Duration |
|
Lecture 5 | Forensic Analysis (OBJ | 00:06:37 Duration |
|
Lecture 6 | Steganography | 00:03:43 Duration |
Section 32 : Digital Forensic Tools (Domain 2)
|
Lecture 1 | Digital Forensic Tools | 00:02:19 Duration |
|
Lecture 2 | Forensic Workstations (OBJ | 00:05:08 Duration |
|
Lecture 3 | File Carving Tools (OBJ | 00:03:33 Duration |
|
Lecture 4 | Binary Analysis Tools (OBJ | 00:07:08 Duration |
|
Lecture 5 | Performing Malware Analysis (OBJ | 00:25:19 Duration |
|
Lecture 6 | Forensic Analysis Tools (OBJ | 00:08:08 Duration |
|
Lecture 7 | Using Aircrack-ng (OBJ | 00:07:45 Duration |
|
Lecture 8 | Imaging Tools (OBJ | 00:07:45 Duration |
|
Lecture 9 | Collecting and Validating Evidence (OBJ | 00:09:02 Duration |
|
Lecture 10 | About Certification | |
|
Lecture 11 | Using Collection Tools (OBJ | 00:04:27 Duration |