Section 1 : Introduction
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 2 | Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals | |
|
Lecture 3 | About Certification | |
|
Lecture 4 | Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course | 00:02:33 Duration |
Section 2 : Introduction to Cybersecurity
|
Lecture 1 | About Proctor Testing | |
|
Lecture 2 | Introduction of Facilitator | |
|
Lecture 3 | Is our Data really safe on internet | 00:00:55 Duration |
|
Lecture 4 | What is Cybersecurity | 00:01:20 Duration |
|
Lecture 5 | Evolution of Cyber Threats | 00:03:42 Duration |
|
Lecture 6 | Three Types of Security Goals | 00:05:12 Duration |
|
Lecture 7 | Importance of Cybersecurity | 00:03:21 Duration |
|
Lecture 8 | Threat, Vulnerability, and Risk | 00:02:11 Duration |
|
Lecture 9 | Networking Devices Router | 00:02:19 Duration |
|
Lecture 10 | Networking Devices Switch | 00:01:41 Duration |
|
Lecture 11 | What is an IP Address | 00:02:44 Duration |
|
Lecture 12 | What is a MAC Address | 00:02:43 Duration |
|
Lecture 13 | What is a PORT Address | 00:02:16 Duration |
|
Lecture 14 | What is a DNS | 00:04:48 Duration |
|
Lecture 15 | What is a VPN | 00:02:08 Duration |
|
Lecture 16 | What is a Virus | |
|
Lecture 17 | Learn Hacking and the different Types of Hackers | 00:04:39 Duration |
|
Lecture 18 | Job Profiles in the field of Cybersecurity | 00:01:28 Duration |
|
Lecture 19 | Important Cybersecurity Skills | 00:05:24 Duration |
Section 3 : Fundamentals of Networking
|
Lecture 1 | INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM | |
|
Lecture 2 | Computer Networks | 00:02:28 Duration |
|
Lecture 3 | The OSI Model | 00:03:27 Duration |
|
Lecture 4 | OSI Model Application Layer | 00:01:59 Duration |
|
Lecture 5 | OSI Model Presentation Layer | 00:03:28 Duration |
|
Lecture 6 | OSI Model Session Layer | 00:03:58 Duration |
|
Lecture 7 | OSI Model Transport Layer | 00:04:52 Duration |
|
Lecture 8 | OSI Model Network Layer | |
|
Lecture 9 | OSI Model Data Link Layer | 00:02:42 Duration |
|
Lecture 10 | OSI Model Physical Layer | 00:01:14 Duration |
|
Lecture 11 | OSI Layers Example | 00:01:04 Duration |
|
Lecture 12 | OSI Layers Protocols | 00:02:32 Duration |
|
Lecture 13 | HTTP Protocol | 00:10:00 Duration |
|
Lecture 14 | About Certification | |
|
Lecture 15 | TCP Protocol | 00:04:38 Duration |
|
Lecture 16 | UDP Protocol | 00:05:50 Duration |
|
Lecture 17 | Difference between UDP and TCP Protocol | 00:02:17 Duration |
|
Lecture 18 | DHCP Protocol | 00:09:20 Duration |
|
Lecture 19 | ARP Protocol | 00:04:51 Duration |
|
Lecture 20 | What is an IP address and its types | 00:07:01 Duration |
|
Lecture 21 | What is a Port Address and its types | 00:04:10 Duration |
|
Lecture 22 | Network Troubleshooting | 00:09:14 Duration |
Section 4 : Types of Attacks part 1
|
Lecture 1 | What is an Attack | 00:02:24 Duration |
|
Lecture 2 | Categories of Cyber Attacks | 00:09:06 Duration |
|
Lecture 3 | Types of Attacks | 00:00:50 Duration |
|
Lecture 4 | Password attack and its types | 00:09:34 Duration |
|
Lecture 5 | Malware Attack | 00:01:42 Duration |
|
Lecture 6 | Types of Malware Worms | 00:02:04 Duration |
|
Lecture 7 | Types of Malware Viruses | 00:02:42 Duration |
|
Lecture 8 | Types of Malware Trojan | 00:02:29 Duration |
|
Lecture 9 | Types of Malware Adware | 00:02:33 Duration |
|
Lecture 10 | Types of Malware Spyware | 00:01:05 Duration |
|
Lecture 11 | Types of Malware Crimeware | 00:02:12 Duration |
|
Lecture 12 | Types of Malware Rootkit | 00:02:02 Duration |
|
Lecture 13 | Types of Malware Ransomware | 00:03:28 Duration |
|
Lecture 14 | Man in the Middle Attack | 00:03:42 Duration |
|
Lecture 15 | Man in the Middle Attack Example | 00:04:49 Duration |
|
Lecture 16 | Sniffing Attack | |
|
Lecture 17 | DOS Attack | 00:10:50 Duration |
|
Lecture 18 | DOS Attack Example | 00:02:13 Duration |
Section 5 : Types of Attacks part 2
|
Lecture 1 | What is DDOS Attack | 00:05:10 Duration |
|
Lecture 2 | DDOS Attack Example | 00:11:46 Duration |
|
Lecture 3 | Phishing Attack | 00:07:40 Duration |
|
Lecture 4 | Phishing Attack Example | 00:01:27 Duration |
|
Lecture 5 | SQL Injection Attack | 00:01:53 Duration |
|
Lecture 6 | Example of SQL Injection Attack | 00:04:40 Duration |
|
Lecture 7 | Cross-site Scripting Attack | 00:06:17 Duration |
|
Lecture 8 | Post Scanning Attack | 00:07:09 Duration |
Section 6 : Cryptography part 1
|
Lecture 1 | What is Cryptology | 00:02:45 Duration |
|
Lecture 2 | The Need for Cryptography | 00:03:13 Duration |
|
Lecture 3 | Basic Cryptography System | |
|
Lecture 4 | What is Encryption | 00:01:48 Duration |
|
Lecture 5 | What is Decryption | 00:01:14 Duration |
|
Lecture 6 | Define Plain text | 00:00:35 Duration |
|
Lecture 7 | About Proctor Testing | |
|
Lecture 8 | What is Secret Key | 00:00:42 Duration |
|
Lecture 9 | What is Cipher text | 00:01:22 Duration |
|
Lecture 10 | Cryptography System | 00:04:19 Duration |
|
Lecture 11 | Cryptography in everyday life | 00:07:49 Duration |
|
Lecture 12 | Types of Cryptography | 00:01:43 Duration |
|
Lecture 13 | Symmetric Key Cryptography | 00:06:35 Duration |
|
Lecture 14 | Asymmetric Key Cryptography | 00:08:51 Duration |
|
Lecture 15 | What is Hashing | 00:06:42 Duration |
|
Lecture 16 | Hashing Algorithm | 00:02:08 Duration |
|
Lecture 17 | Techniques of Hashing | 00:10:22 Duration |
Section 7 : Cryptography part 2
|
Lecture 1 | What is Substitution Cipher | 00:04:02 Duration |
|
Lecture 2 | What is Transposition Cipher | 00:02:11 Duration |
|
Lecture 3 | Cesar Cipher and how it works | 00:07:46 Duration |
|
Lecture 4 | Example of Cesar Cipher | 00:04:08 Duration |
|
Lecture 5 | Transposition Cipher | 00:01:41 Duration |
|
Lecture 6 | Example of Transposition Cipher | 00:04:18 Duration |
|
Lecture 7 | Stream Cipher | 00:04:33 Duration |
|
Lecture 8 | Block Cipher | 00:03:39 Duration |
|
Lecture 9 | Advantages of Symmetric Key Cryptography | 00:02:13 Duration |
|
Lecture 10 | Why Asymmetric key cryptography is important | 00:02:09 Duration |
|
Lecture 11 | Advantages of Asymmetric Key Cryptography | 00:03:25 Duration |
|
Lecture 12 | Digital Signature | 00:02:48 Duration |
|
Lecture 13 | Signing and Verification Process | 00:05:34 Duration |
|
Lecture 14 | How to check the Integrity of a Message | 00:05:46 Duration |
Section 8 : Security Measures
|
Lecture 1 | Security Measures | 00:03:03 Duration |
|
Lecture 2 | What is Firewall | 00:12:13 Duration |
|
Lecture 3 | Types of Firewall Packet Filter | 00:06:32 Duration |
|
Lecture 4 | Types of Firewall Stateful Inspection Firewall | 00:05:04 Duration |
|
Lecture 5 | Types of Firewall Proxy-server firewall | 00:04:44 Duration |
Section 9 : Cyber Law
Section 10 : Digital Forensics
|
Lecture 1 | Definition of Digital Forensics | 00:04:46 Duration |
|
Lecture 2 | Process of Digital Forensics | 00:08:20 Duration |
|
Lecture 3 | Types of Digital Forensics | 00:01:57 Duration |