Section 1 : Introduction

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 2 Download Your Free Study Guide Text

Section 2 : Data Considerations (Domain 4)

Lecture 3 Data Considerations (OBJ 4 0:54
Lecture 4 Data Security (OBJ 3:41
Lecture 5 Data Classification (OBJ 2:44
Lecture 6 Data Types (OBJ 5:21
Lecture 7 Data Retention (OBJ 6:52
Lecture 8 Data Destruction (OBJ 2:52
Lecture 9 Data Ownership (OBJ 5:31
Lecture 10 Data Sovereignty (OBJ 3:14

Section 3 : Risk Management (Domain 4)

Lecture 11 Risk Management (OBJ 4 1:27
Lecture 12 Risk Strategies (OBJ 4:27
Lecture 13 Risk Management Lifecycle (OBJ 11:49
Lecture 14 Risk Types (OBJ 3:0
Lecture 15 Risk Handling (OBJ 8:30
Lecture 16 Risk Tracking (OBJ 5:4
Lecture 17 Risk Assessment (OBJ 17:57
Lecture 18 When Risk Management Fails (OBJ 3:41

Section 4 : Policies and Frameworks (Domain 4)

Lecture 19 Policies and Frameworks (OBJ 1:20
Lecture 20 Policies (OBJ 11:57
Lecture 21 Frameworks (OBJ 5:4
Lecture 22 Regulations (OBJ 8:5
Lecture 23 Standards (OBJ 6:8
Lecture 24 Contracts and Agreements (OBJ 9:20
Lecture 25 Legal Considerations (OBJ 7:0
Lecture 26 Integrating Industries (OBJ 3:25

Section 5 : Business Continuity (Domain 4)

Lecture 27 Business Continuity (OBJ 4 1:8
Lecture 28 Business Continuity Plan (OBJ 4 13:39
Lecture 29 Business Impact Analysis (OBJ 4 13:49
Lecture 30 Privacy Impact Assessment (OBJ 4 3:50
Lecture 31 Incident Response Plan (OBJ 4 10:55
Lecture 32 Testing Plans (OBJ 4 7:7

Section 6 : Risk Strategies (Domain 4)

Lecture 33 Risk Strategies (OBJ 4 1:29
Lecture 34 Asset Value (OBJ 4 4:1
Lecture 35 Access Control (OBJ 4 6:17
Lecture 36 Aggregating Risk (OBJ 4 3:4
Lecture 37 Scenario Planning (OBJ 4 8:18
Lecture 38 Security Controls (OBJ 4 9:13
Lecture 39 Security Solutions (OBJ 4 8:51
Lecture 40 Cost of a Data Breach (OBJ 4 5:59

Section 7 : Vendor Risk (Domain 4)

Lecture 41 Vendor Risk (OBJ 4 3:58
Lecture 42 Business Models (OBJ 4 11:1
Lecture 43 Influences (OBJ 4 7:22
Lecture 44 Organizational Changes (OBJ 4 6:7
Lecture 45 Shared Responsibility Model (OBJ 4 4:47
Lecture 46 Viability and Support (OBJ 4 10:47
Lecture 47 Dependencies (OBJ 4 4:36
Lecture 48 Considerations (OBJ 4 10:32
Lecture 49 Supply Chain (OBJ 4 5:56

Section 8 : Securing Networks (Domain 1)

Lecture 50 Securing Networks (OBJ 1 6:45
Lecture 51 Switches (OBJ 1 7:23
Lecture 52 Routers (OBJ 1 8:23
Lecture 53 Wireless and Mesh (OBJ 1 3:20
Lecture 54 Firewalls (OBJ 1 11:27
Lecture 55 Configuring Firewalls (OBJ 1 6:43
Lecture 56 Proxies (OBJ 1 7:9
Lecture 57 Gateways (OBJ 1 4:36
Lecture 58 IDS and IPS (OBJ 1 6:25
Lecture 59 Network Access Control (NAC) (OBJ 1 2:53
Lecture 60 Remote Access (OBJ 1 8:56
Lecture 61 Unified Communications (OBJ 1 19:5
Lecture 62 Cloud vs On-premise (OBJ 1 4:46
Lecture 63 DNSSEC (OBJ 1 4:12
Lecture 64 Load Balancer (OBJ 1 6:44

Section 9 : Securing Architectures (Domain 1)

Lecture 65 Securing Architectures (OBJ 1
Lecture 66 Traffic Mirroring (OBJ 1 4:20
Lecture 67 Network Sensors (OBJ 1 11:42
Lecture 68 Host Sensors (OBJ 1 6:12
Lecture 69 Layer 2 Segmentation (OBJ 1 5:11
Lecture 70 Network Segmentation (OBJ 1 13:10
Lecture 71 Implement Network Segmentation (OBJ 1 10:3
Lecture 72 Server Segmentation (OBJ 1 10:49
Lecture 73 Zero Trust (OBJ 1 6:34
Lecture 74 Merging Networks (OBJ 1 5:29
Lecture 75 Software-Defined Networking (SDN) (OBJ 1 5:24

Section 10 : Infrastructure Design (Domain 1)

Lecture 76 Infrastructure Design (OBJ 1 1:5
Lecture 77 Scalability (OBJ 1 5:36
Lecture 78 Resiliency Issues (OBJ 1 12:45
Lecture 79 Automation (OBJ 1 6:22
Lecture 80 Performance Design (OBJ 1 5:59
Lecture 81 Virtualization (OBJ 1 8:15
Lecture 82 Securing VMs (OBJ 1 4:41
Lecture 83 Containerization (OBJ 1 5:45

Section 11 : Cloud and Virtualization (Domain 1)

Lecture 84 Cloud and Virtualization (OBJ 1 1:3
Lecture 85 Cloud Deployment Models (OBJ 1 4:30
Lecture 86 Cloud Service Models (OBJ 1 5:3
Lecture 87 Deployment Considerations (OBJ 1 4:54
Lecture 88 Provider Limitations (OBJ 1 2:56
Lecture 89 Extending Controls (OBJ 1 5:3
Lecture 90 Provision and Deprovision (OBJ 1 2:56
Lecture 91 Storage Models (OBJ 1 5:19
Lecture 92 Virtualization (OBJ 1 7:52

Section 12 : Software Applications (Domain 1)

Lecture 93 Software Applications (OBJ 1 2:39
Lecture 94 Systems Development Life Cycle (OBJ 1 6:33
Lecture 95 Software Development Life Cycle (OBJ 1
Lecture 96 Development Approaches (OBJ 1 10:47
Lecture 97 Software Assurance (OBJ 1 8:53
Lecture 98 Baselins and Templates (OBJ 1 6:27
Lecture 99 Best Practices (OBJ 1 6:4
Lecture 100 Integrating Applications (OBJ 1 4:28

Section 13 : Data Security (Domain 1)

Lecture 101 Data Security (OBJ 1 3:33
Lecture 102 Data Life Cycle (OBJ 1 10:26
Lecture 103 Data Classification (OBJ 1 6:52
Lecture 104 Labeling and Tagging (OBJ 1 8:8
Lecture 105 Deidentification (OBJ 1 11:0
Lecture 106 Data Encryption (OBJ 1 7:29
Lecture 107 Data Loss Prevention (DLP) (OBJ 1 9:57
Lecture 108 DLP Detection (OBJ 1 6:38
Lecture 109 Data Loss Detection (OBJ 1 11:31
Lecture 110 Auditing Files (OBJ 1 3:53

Section 14 : Authentication and Authorization (Domain 1)

Lecture 111 Authentication and Authorization (OBJ 1
Lecture 112 Access Control (OBJ 1 4:43
Lecture 113 Credential Management (OBJ 1 4:24
Lecture 114 Password Policies (OBJ 1 7:58
Lecture 115 Implementing Password Policies (OBJ 1 4:34
Lecture 116 Cracking Weak Passwords (OBJ 1 2:32
Lecture 117 Multifactor Authentication (OBJ 1 8:22
Lecture 118 Authentication Protocols (OBJ 1 9:57
Lecture 119 Federation (OBJ 1 6:59
Lecture 120 Root of Trust (OBJ 1 4:21
Lecture 121 Attestation (OBJ 1 2:11
Lecture 122 Identity Proofing (OBJ 1 3:30

Section 15 : Cryptography (Domain 1)

Lecture 123 Cryptography (OBJ 1 1:45
Lecture 124 Privacy and Confidentiality (OBJ 1 6:28
Lecture 125 Integrity and Non-repudiation (OBJ 1 6:27
Lecture 126 Compliance and Policy (OBJ 1 3:29
Lecture 127 Data States (OBJ 1 6:59
Lecture 128 Cryptographic Use Cases (OBJ 1 6:14
Lecture 129 PKI Use Cases (OBJ 1 8:38

Section 16 : Emerging Technology (Domain 1)

Lecture 130 Emerging Technology (OBJ 1 4:14
Lecture 131 Artificial Intelligence (AI) & Machine Learning (ML) (OBJ 1 8:52
Lecture 132 Deep Learning (OBJ 1 8:54
Lecture 133 Big Data (OBJ 1 4:37
Lecture 134 Blockchain & Distributed Consensus (OBJ 1 5:33
Lecture 135 Passwordless Authentication (OBJ 1 5:14
Lecture 136 Homomorphic Encryption (OBJ 1 3:33
Lecture 137 VirtualAugmented Reality (OBJ 1 4:28
Lecture 138 3D Printing (OBJ 1 3:0
Lecture 139 Quantum Computing (OBJ 1 5:31

Section 17 : Enterprise Mobility (Domain 3)

Lecture 140 Enterprise Mobility 2:33
Lecture 141 Enterprise Mobility Management (EMM) (OBJ 9:33
Lecture 142 WPA3 (OBJ 7:17
Lecture 143 Connectivity Options (OBJ 8:45
Lecture 144 Security Configurations (OBJ 8:5
Lecture 145 DNS Protection (OBJ 3:12
Lecture 146 Deployment Options (OBJ 4:35
Lecture 147 Reconnaissance Concerns (OBJ 7:57
Lecture 148 Mobile Security (OBJ 7:47

Section 18 : Endpoint Security Controls (Domain 3)

Lecture 149 Endpoint Security Controls 2:21
Lecture 150 Device Hardening (OBJ 8:26
Lecture 151 Unnecessary Services (OBJ 5:35
Lecture 152 Patching (OBJ 4:38
Lecture 153 Security Settings (OBJ 5:38
Lecture 154 Mandatory Access Controls (MAC) (OBJ 6:41
Lecture 155 Secure Boot (OBJ 5:45
Lecture 156 Hardware Encryption (OBJ 4:45
Lecture 157 Endpoint Protections (OBJ 9:51
Lecture 158 Logging and Monitoring (OBJ 6:11
Lecture 159 Configuring SIEM Agents (OBJ 19:26
Lecture 160 Resiliency (OBJ 6:1

Section 19 : Cloud Technologies (Domain 3)

Lecture 161 Cloud Technologies 2:34
Lecture 162 Business ContinuityDisaster Recovery (BCDR) (OBJ 7:48
Lecture 163 Cloud Encryption (OBJ 5:19
Lecture 164 Serverless Computing (OBJ 8:51
Lecture 165 Software-Defied Networking (SDN) (OBJ 6:49
Lecture 166 Log Collection and Analysis (OBJ 4:19
Lecture 167 Cloud Access Security Broker (CASB) (OBJ 6:13
Lecture 168 Cloud Misconfigurations (OBJ 10:53

Section 20 : Operational Technologies (Domain 3)

Lecture 169 Operational Technologies 2:2
Lecture 170 Embedded Systems (OBJ 10:25
Lecture 171 ICS and SCADA (OBJ 9:15
Lecture 172 ICS Protocols (OBJ 10:51
Lecture 173 Industries and Sectors (OBJ 4:45

Section 21 : Hashing and Symmetric Algorithms (Domain 3)

Lecture 174 Hashing and Symmetric Algorithms 1:10
Lecture 175 Hashing (OBJ 6:51
Lecture 176 Calculating Hash Digests (OBJ 3:4
Lecture 177 Message Authentication (OBJ 3:30
Lecture 178 Symmetric Algorithms (OBJ 5:40
Lecture 179 Stream Ciphers (OBJ 4:29
Lecture 180 Block Ciphers (OBJ 9:58

Section 22 : Asymmetric Algorithms (Domain 3)

Lecture 181 Asymmetric Algorithms 2:9
Lecture 182 Using Asymmetric Algortihms 9:25
Lecture 183 SSLTLS and Cipher Suites (OBJ 8:18
Lecture 184 SMIME and SSH (OBJ 7:24
Lecture 185 EAP (OBJ 5:36
Lecture 186 IPSec (OBJ 14:31
Lecture 187 Elliptic Curve Cryptography (ECC) (OBJ 3:30
Lecture 188 Forward Secrecy (OBJ 3:32
Lecture 189 Authenticated Encryption with Associated Data (AEAD) (OBJ 1:49
Lecture 190 Key Stretching (OBJ 4:26

Section 23 : Public Key Infrastructure (Domain 3)

Lecture 191 Public Key Infrastructure 2:47
Lecture 192 PKI Components (OBJ 10:15
Lecture 193 Digital Certificates (OBJ 7:41
Lecture 194 Using Digital Certificates (OBJ 5:36
Lecture 195 Exploring Server Certificates (OBJ 3:31
Lecture 196 Trust Models (OBJ 4:26
Lecture 197 Certificate Management (OBJ 2:40
Lecture 198 Certificate Validity (CRL and OCSP) (OBJ 3:45
Lecture 199 Protecting Web Traffic (OBJ 3:27
Lecture 200 Troubleshooting Certificates (OBJ 5:19
Lecture 201 Troubleshooting Keys (OBJ 3:31

Section 24 : Threat and Vulnerability Management (Domain 2)

Lecture 202 Threat and Vulnerability Management 1:53
Lecture 203 Threat Intelligence (OBJ 6:16
Lecture 204 Threat Hunting (OBJ 6:40
Lecture 205 Intelligence Collection (OBJ 11:5
Lecture 206 Threat Actors (OBJ 9:18
Lecture 207 Threat Management Frameworks (OBJ 12:42
Lecture 208 Vulnerability Management Activities (OBJ 11:42
Lecture 209 Security Content Automation Protocol (SCAP) (OBJ 7:18

Section 25 : Vulnerability Assessments (Domain 2)

Lecture 210 Vulnerability Assessments 1:32
Lecture 211 Penetration Test (OBJ 4:46
Lecture 212 PenTest Steps (OBJ 6:59
Lecture 213 PenTest Requirements (OBJ 11:21
Lecture 214 Code Analysis (OBJ 8:26
Lecture 215 Protocol Analysis (OBJ 7:49
Lecture 216 TCPDump (OBJ 7:47
Lecture 217 Wireshark (OBJ 9:40
Lecture 218 Nmap (OBJ 10:35
Lecture 219 Analysis Utilities (OBJ 5:16
Lecture 220 Vulnerability Scanning (OBJ 9:24
Lecture 221 Analyzing Scan Outputs (OBJ 13:32

Section 26 : Risk Reduction (Domain 2)

Lecture 222 Risk Reduction 1:29
Lecture 223 Deceptive Technologies (OBJ 4:58
Lecture 224 Security Data Analytics (OBJ 8:1
Lecture 225 Preventative Controls (OBJ 5:7
Lecture 226 Application Controls (OBJ 9:38
Lecture 227 Security Automation (OBJ 10:39
Lecture 228 Physical Security (OBJ 11:41
Lecture 229 Lock Picking (OBJ 1:37

Section 27 : Analyzing Vulnerabilities (Domain 2)

Lecture 230 Analyzing Vulnerabilities 1:19
Lecture 231 Race Conditions (OBJ 4:55
Lecture 232 Buffer Overflows (OBJ 12:23
Lecture 233 Buffer Overflow Attack (OBJ 6:24
Lecture 234 Authentication and References (OBJ 2:30
Lecture 235 Ciphers and Certificates (OBJ 10:42
Lecture 236 Improper Headers (OBJ 6:6
Lecture 237 Software Composition (OBJ 9:46
Lecture 238 Vulnerable Web Applications (OBJ 11:41

Section 28 : Attacking Vulnerabilities (Domain 2)

Lecture 239 Attacking Vulnerabilities 1:12
Lecture 240 Directory Traversals (OBJ 9:45
Lecture 241 Cross-Site Scripting (XSS) (OBJ 8:56
Lecture 242 Cross-Site Request Forgery (CSRF) (OBJ 7:12
Lecture 243 SQL Injections (OBJ 7:2
Lecture 244 XML Injections (OBJ 6:26
Lecture 245 Other Injection Attacks (OBJ 4:18
Lecture 246 Authentication Bypass (OBJ
Lecture 247 Web Application Vulnerabilities (OBJ 8:38
Lecture 248 VM Attacks (OBJ 4:49
Lecture 249 Network Attacks (OBJ 11:0
Lecture 250 Analyzing Web Applications (OBJ 15:40
Lecture 251 Social Engineering (OBJ 7:11
Lecture 252 Phishing Campaigns (OBJ 5:19

Section 29 : Indicators of Compromise (Domain 2)

Lecture 253 Indicators of Compromise 1:46
Lecture 254 Types of IoCs (OBJ 3:52
Lecture 255 PCAP Files (OBJ 4:13
Lecture 256 Conduct Packet Analysis (OBJ 6:0
Lecture 257 NetFlow (OBJ 7:4
Lecture 258 Logs (OBJ
Lecture 259 IoC Notifications (OBJ 7:37
Lecture 260 Response to IoCs (OBJ 5:12
Lecture 261 Security Appliances (OBJ 15:40

Section 30 : Incident Response (Domain 2)

Lecture 262 Incident Response 1:23
Lecture 263 Triage (OBJ 8:0
Lecture 264 Communication Plan (OBJ 10:3
Lecture 265 Stakeholder Management (OBJ 7:8
Lecture 266 Incident Response Process (OBJ 10:19
Lecture 267 Playbooks (OBJ 8:24

Section 31 : Digital Forensics (Domain 2)

Lecture 268 Digital Forensics 1:1
Lecture 269 Forensic Process (OBJ 4:35
Lecture 270 Chain of Custody (OBJ 7:3
Lecture 271 Order of Volatility (OBJ 6:28
Lecture 272 Forensic Analysis (OBJ 6:37
Lecture 273 Steganography 3:43

Section 32 : Digital Forensic Tools (Domain 2)

Lecture 274 Digital Forensic Tools 2:19
Lecture 275 Forensic Workstations (OBJ 5:8
Lecture 276 File Carving Tools (OBJ 3:33
Lecture 277 Binary Analysis Tools (OBJ 7:8
Lecture 278 Performing Malware Analysis (OBJ 25:19
Lecture 279 Forensic Analysis Tools (OBJ 8:8
Lecture 280 Using Aircrack-ng (OBJ 7:45
Lecture 281 Imaging Tools (OBJ 7:45
Lecture 282 Collecting and Validating Evidence (OBJ 9:2
Lecture 283 About Certification Pdf
Lecture 284 Using Collection Tools (OBJ 4:27