Section 1 : Introduction

Lecture 1 Introduction 3:4
Lecture 2 Course Work Overview 1:54
Lecture 3 Sample Tool 1 - Log Analyzer 10:23
Lecture 4 Sample Tool 1 - Text Instructions Text
Lecture 5 Sample Tool 2 - Password Checker 7:26
Lecture 6 Sample Tool 2 - Text Instructions Text
Lecture 7 Development Environment Overview 4:34
Lecture 8 Important course updates (don't skip) Text

Section 2 : Cyber Security

Lecture 9 Cyber Security Introduction to Section 2 0:46
Lecture 10 What is Cyber Security 8:1
Lecture 11 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 12 Intro to Python and Python crash course (section 7) for beginners Text
Lecture 13 repl 6:34
Lecture 14 Penetration Testing - Overview 5:32
Lecture 15 Penetration Testing - Code Example 5:27
Lecture 16 Penetration Testing - Text Instructions Text
Lecture 17 Penetration Testing - Remediation 8:28
Lecture 18 Port Scanning - Overview 4:30
Lecture 19 Port Scanning - Code Example
Lecture 20 Port Scanning - Text Instructions Text
Lecture 21 Port Scanning - Remediation 3:52
Lecture 22 Botnets - Overview 6:2
Lecture 23 Botnets - Code Example 5:6
Lecture 24 Botnets - Code Example Continued 5:5
Lecture 25 Botnets - Text Instructions Text
Lecture 26 Botnets - Remediation 12:15
Lecture 27 Code Exploits - Overview 4:52
Lecture 28 Code Exploits - Code Example 5:33
Lecture 29 Code Exploits - Text Instructions Text
Lecture 30 Code Exploits - Remediation 3:55
Lecture 31 Forensic Investigation - Overview 5:31
Lecture 32 Forensic Investigation - Code Example 8:30
Lecture 33 Forensic Investigation - Text Instructions Text
Lecture 34 Forensic Investigation - Remediation 5:9
Lecture 35 Network Traffic Analysis - Overview 5:11
Lecture 36 Network Traffic Analysis - Code Example 4:28
Lecture 37 Network Traffic Analysis - Text Instructions Text
Lecture 38 Network Traffic Analysis - Remediation 3:44
Lecture 39 Wireless - Overview 4:33
Lecture 40 Wireless - Code Example 3:8
Lecture 41 Wireless - Text Instructions Text
Lecture 42 Wireless - Remediation 9:59
Lecture 43 Web Reconnaissance - Overview 5:32
Lecture 44 Web Reconnaissance - Code Example 9:37
Lecture 45 Web Reconnaissance - Text Instructions Text
Lecture 46 Web Reconnaissance - Remediation 6:31
Lecture 47 Antivirus Evasion - Overview 5:40
Lecture 48 Antivirus Evasion - Code Example 7:2
Lecture 49 Antivirus Evasion - Text Instructions Text
Lecture 50 Antivirus Evasion - Remediation 3:33
Lecture 51 Social Engineering - Overview 6:57
Lecture 52 Social Engineering - Code Example 4:30
Lecture 53 Social Engineering - Text Instructions Text
Lecture 54 Social Engineering - Remediation 2:57

Section 3 : Building a Security Tool

Lecture 55 Introduction to Section 3 - Building your own tool with Python 1:16
Lecture 56 Installing Python Locally Text
Lecture 57 Tool Development with Python - Overview 4:54
Lecture 58 Introduction to Pip 3:56
Lecture 59 Introduction to Pip - Text Instructions Text
Lecture 60 Basic Python Script 3:24
Lecture 61 Basic Python Script - Text Instructions Text
Lecture 62 Command Line Arguments 3:16
Lecture 63 Command Line Arguments - Text Instructions Text
Lecture 64 Argument Parsing 6:29
Lecture 65 Argument Parsing - Text Instructions Text
Lecture 66 Validating Input 3:37
Lecture 67 Validating Input - Text Instructions Text
Lecture 68 Sending Requests to the Web 2:41
Lecture 69 Sending Requests to the Web - Text Instructions Text
Lecture 70 Parsing Results 6:44
Lecture 71 Parsing Results - Text Instructions Text
Lecture 72 Checking Forms 4:32
Lecture 73 Checking Forms - Text Instructions Text
Lecture 74 Generating the Report 2:19
Lecture 75 Generating the Report - Text Instructions Text
Lecture 76 Checking Comments 6:33
Lecture 77 Checking Comments - Text Instructions Text
Lecture 78 Checking Inputs 5:12
Lecture 79 Checking Inputs - Text Instructions Text
Lecture 80 Improving the Report 2:58
Lecture 81 Improving the Report - Text Instructions Text
Lecture 82 Configuration from File 3:42
Lecture 83 Configuration from File - Text Instructions Text
Lecture 84 Using Config Settings 7:16
Lecture 85 Using Config Settings - Text Instructions Text
Lecture 86 Merging the Configs 2:9
Lecture 87 Merging the Configs - Text Instructions Text
Lecture 88 Outputting the Report 8:36
Lecture 89 Outputting the Report - Text Instructions Text
Lecture 90 Pushing to GitHub 4:29
Lecture 91 Pushing to GitHub - Text Instructions Text
Lecture 92 Testing the Tool 6:5
Lecture 93 Writing the Documentation 6:24
Lecture 94 Distributing Your Tool 5:49

Section 4 : Web Application Security

Lecture 95 Section 4 Introduction 1:17
Lecture 96 Web Application Security Introduction 6:0
Lecture 97 OWASP Overview 4:37
Lecture 98 Introduction to the OWASP Top 10 1:28
Lecture 99 Rails Overview 3:15
Lecture 100 PHP Overview 5:9
Lecture 101 Installing Rails and PHP Text
Lecture 102 OWASP Top 10 Vulnerabilities Example Code - Where to get it Text
Lecture 103 Command Injection - Overview 4:49
Lecture 104 Command Injection - Rails Example 6:44
Lecture 105 Command Injection - Rails example - Text Instructions Text
Lecture 106 Command Injection - PHP Example 4:10
Lecture 107 Command Injection - PHP example - Text Instructions Text
Lecture 108 SQL Injection - Overview 6:26
Lecture 109 SQL Injection - Rails Example 3:59
Lecture 110 SQL Injection - Rails example - Text Instructions Text
Lecture 111 SQL Injection - PHP Example 3:32
Lecture 112 SQL Injection Remediation - PHP Example 2:26
Lecture 113 SQL Injection - PHP example - Text Instructions Text
Lecture 114 Password Complexity - Overview 6:47
Lecture 115 Password Complexity - Rails Example 6:50
Lecture 116 Password Complexity - Rails example - Text Instructions Text
Lecture 117 Password Complexity - PHP Example 6:28
Lecture 118 Password Complexity - PHP example - Text Instructions Text
Lecture 119 Information Leakage - Overview
Lecture 120 Information Leakage - Rails Example
Lecture 121 Information Leakage - Rails example - Text Instructions Text
Lecture 122 Information Leakage - PHP Example
Lecture 123 Information Leakage - PHP example - Text Instructions Text
Lecture 124 Sensitive Data Exposure - Overview 4:53
Lecture 125 Sensitive Data Exposure - Rails Example 4:23
Lecture 126 Sensitive Data Exposure - Rails example - Text Instructions Text
Lecture 127 Sensitive Data Exposure - PHP Example 2:54
Lecture 128 Sensitive Data Exposure - PHP example - Text Instructions Text
Lecture 129 XML External Entities (XXE) - Overview 4:41
Lecture 130 XML External Entities (XXE) - Rails Example 4:36
Lecture 131 XML External Entities (XXE) - Rails example - Text Instructions Text
Lecture 132 XML External Entities (XXE) - PHP Example 4:29
Lecture 133 XML External Entities (XXE) - PHP example - Text Instructions Text
Lecture 134 Broken Access Control - Overview 5:13
Lecture 135 Broken Access Control - Rails Example 11:56
Lecture 136 Broken Access Control - Rails example - Text Instructions Text
Lecture 137 Broken Access Control - PHP Example 3:40
Lecture 138 Broken Access Control - PHP example - Text Instructions Text
Lecture 139 Security Misconfiguration - Overview 5:51
Lecture 140 Security Misconfiguration - Rails Example 3:46
Lecture 141 Security Misconfiguration - Rails example - Text Instructions Text
Lecture 142 Security Misconfiguration - PHP Example 3:29
Lecture 143 Security Misconfiguration - PHP example - Text Instructions Text
Lecture 144 Cross-Site Scripting (XSS) - Overview 1:34
Lecture 145 Cross-Site Scripting (XSS) - Rails Example 5:9
Lecture 146 Cross-Site Scripting (XSS) - Rails example - Text Instructions Text
Lecture 147 Cross-Site Scripting (XSS) - PHP Example 5:50
Lecture 148 Cross-Site Scripting (XSS) - PHP example - Text Instructions Text
Lecture 149 Insecure Deserialization - Overview 3:47
Lecture 150 Insecure Deserialization - Rails Example 5:19
Lecture 151 Insecure Deserialization - Rails example - Text Instructions Text
Lecture 152 Insecure Deserialization - PHP Example 7:22
Lecture 153 Insecure Deserialization - PHP example - Text Instructions Text
Lecture 154 Using Components with Known Vulnerabilities - Overview 5:28
Lecture 155 Using Components with Known Vulnerabilities - Rails Example 11:1
Lecture 156 Using Components with Known Vulnerabilities - Rails example - Text Instructions Text
Lecture 157 Using Components with Known Vulnerabilities - PHP Example 4:38
Lecture 158 Using Components with Known Vulnerabilities - PHP example - Text Instructions Text
Lecture 159 Insufficient Logging and Monitoring - Overview 4:7
Lecture 160 Insufficient Logging Monitoring - Rails example 5:49
Lecture 161 Insufficient Logging and Monitoring - Rails Example - Text Instructions Text
Lecture 162 Insufficient Logging Monitoring - PHP example - Text Instructions 6:15
Lecture 163 Insufficient Logging and Monitoring - PHP Example - Text Instructions Text
Lecture 164 Web Security Analysis Tool 9:18

Section 5 : Topics in Cyber Security

Lecture 165 Multi-Factor Authentication 16:35
Lecture 166 Ethical Hacking 5:8
Lecture 167 Password Complexity 11:19
Lecture 168 Physical Security
Lecture 169 Data Breaches 9:35
Lecture 170 Cloud Security 11:45

Section 6 : Python Password Encryption Tool

Lecture 171 Password Encryption Tool Introduction 0:57
Lecture 172 Password Encryption Overview 2:35
Lecture 173 Creating the Tool 2:49
Lecture 174 Command Line Arguments 4:15
Lecture 175 Adding Encryption 4:46
Lecture 176 Check If Encryption Works 2:33
Lecture 177 Password Encryption Tool - Source Code Text

Section 7 : Python Crash Course

Lecture 178 Installation and expectations Text
Lecture 179 Strings Text
Lecture 180 Numbers Text
Lecture 181 Lists, Tuples, Sets Text
Lecture 182 Dictionaries Text
Lecture 183 Branching and FunctionsMethods Text
Lecture 184 Standard library and imports Text
Lecture 185 Object Oriented Programming Classes Text

Section 8 : Summary

Lecture 186 Thank You! 1:8