Section 1 : Introduction

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 2 Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals
Lecture 3 About Certification
Lecture 4 Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course 00:02:33 Duration

Section 2 : Introduction to Cybersecurity

Lecture 1 About Proctor Testing
Lecture 2 Introduction of Facilitator
Lecture 3 Is our Data really safe on internet 00:00:55 Duration
Lecture 4 What is Cybersecurity 00:01:20 Duration
Lecture 5 Evolution of Cyber Threats 00:03:42 Duration
Lecture 6 Three Types of Security Goals 00:05:12 Duration
Lecture 7 Importance of Cybersecurity 00:03:21 Duration
Lecture 8 Threat, Vulnerability, and Risk 00:02:11 Duration
Lecture 9 Networking Devices Router 00:02:19 Duration
Lecture 10 Networking Devices Switch 00:01:41 Duration
Lecture 11 What is an IP Address 00:02:44 Duration
Lecture 12 What is a MAC Address 00:02:43 Duration
Lecture 13 What is a PORT Address 00:02:16 Duration
Lecture 14 What is a DNS 00:04:48 Duration
Lecture 15 What is a VPN 00:02:08 Duration
Lecture 16 What is a Virus
Lecture 17 Learn Hacking and the different Types of Hackers 00:04:39 Duration
Lecture 18 Job Profiles in the field of Cybersecurity 00:01:28 Duration
Lecture 19 Important Cybersecurity Skills 00:05:24 Duration

Section 3 : Fundamentals of Networking

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 2 Computer Networks 00:02:28 Duration
Lecture 3 The OSI Model 00:03:27 Duration
Lecture 4 OSI Model Application Layer 00:01:59 Duration
Lecture 5 OSI Model Presentation Layer 00:03:28 Duration
Lecture 6 OSI Model Session Layer 00:03:58 Duration
Lecture 7 OSI Model Transport Layer 00:04:52 Duration
Lecture 8 OSI Model Network Layer
Lecture 9 OSI Model Data Link Layer 00:02:42 Duration
Lecture 10 OSI Model Physical Layer 00:01:14 Duration
Lecture 11 OSI Layers Example 00:01:04 Duration
Lecture 12 OSI Layers Protocols 00:02:32 Duration
Lecture 13 HTTP Protocol 00:10:00 Duration
Lecture 14 About Certification
Lecture 15 TCP Protocol 00:04:38 Duration
Lecture 16 UDP Protocol 00:05:50 Duration
Lecture 17 Difference between UDP and TCP Protocol 00:02:17 Duration
Lecture 18 DHCP Protocol 00:09:20 Duration
Lecture 19 ARP Protocol 00:04:51 Duration
Lecture 20 What is an IP address and its types 00:07:01 Duration
Lecture 21 What is a Port Address and its types 00:04:10 Duration
Lecture 22 Network Troubleshooting 00:09:14 Duration

Section 4 : Types of Attacks part 1

Lecture 1 What is an Attack 00:02:24 Duration
Lecture 2 Categories of Cyber Attacks 00:09:06 Duration
Lecture 3 Types of Attacks 00:00:50 Duration
Lecture 4 Password attack and its types 00:09:34 Duration
Lecture 5 Malware Attack 00:01:42 Duration
Lecture 6 Types of Malware Worms 00:02:04 Duration
Lecture 7 Types of Malware Viruses 00:02:42 Duration
Lecture 8 Types of Malware Trojan 00:02:29 Duration
Lecture 9 Types of Malware Adware 00:02:33 Duration
Lecture 10 Types of Malware Spyware 00:01:05 Duration
Lecture 11 Types of Malware Crimeware 00:02:12 Duration
Lecture 12 Types of Malware Rootkit 00:02:02 Duration
Lecture 13 Types of Malware Ransomware 00:03:28 Duration
Lecture 14 Man in the Middle Attack 00:03:42 Duration
Lecture 15 Man in the Middle Attack Example 00:04:49 Duration
Lecture 16 Sniffing Attack
Lecture 17 DOS Attack 00:10:50 Duration
Lecture 18 DOS Attack Example 00:02:13 Duration

Section 5 : Types of Attacks part 2

Lecture 1 What is DDOS Attack 00:05:10 Duration
Lecture 2 DDOS Attack Example 00:11:46 Duration
Lecture 3 Phishing Attack 00:07:40 Duration
Lecture 4 Phishing Attack Example 00:01:27 Duration
Lecture 5 SQL Injection Attack 00:01:53 Duration
Lecture 6 Example of SQL Injection Attack 00:04:40 Duration
Lecture 7 Cross-site Scripting Attack 00:06:17 Duration
Lecture 8 Post Scanning Attack 00:07:09 Duration

Section 6 : Cryptography part 1

Lecture 1 What is Cryptology 00:02:45 Duration
Lecture 2 The Need for Cryptography 00:03:13 Duration
Lecture 3 Basic Cryptography System
Lecture 4 What is Encryption 00:01:48 Duration
Lecture 5 What is Decryption 00:01:14 Duration
Lecture 6 Define Plain text 00:00:35 Duration
Lecture 7 About Proctor Testing
Lecture 8 What is Secret Key 00:00:42 Duration
Lecture 9 What is Cipher text 00:01:22 Duration
Lecture 10 Cryptography System 00:04:19 Duration
Lecture 11 Cryptography in everyday life 00:07:49 Duration
Lecture 12 Types of Cryptography 00:01:43 Duration
Lecture 13 Symmetric Key Cryptography 00:06:35 Duration
Lecture 14 Asymmetric Key Cryptography 00:08:51 Duration
Lecture 15 What is Hashing 00:06:42 Duration
Lecture 16 Hashing Algorithm 00:02:08 Duration
Lecture 17 Techniques of Hashing 00:10:22 Duration

Section 7 : Cryptography part 2

Lecture 1 What is Substitution Cipher 00:04:02 Duration
Lecture 2 What is Transposition Cipher 00:02:11 Duration
Lecture 3 Cesar Cipher and how it works 00:07:46 Duration
Lecture 4 Example of Cesar Cipher 00:04:08 Duration
Lecture 5 Transposition Cipher 00:01:41 Duration
Lecture 6 Example of Transposition Cipher 00:04:18 Duration
Lecture 7 Stream Cipher 00:04:33 Duration
Lecture 8 Block Cipher 00:03:39 Duration
Lecture 9 Advantages of Symmetric Key Cryptography 00:02:13 Duration
Lecture 10 Why Asymmetric key cryptography is important 00:02:09 Duration
Lecture 11 Advantages of Asymmetric Key Cryptography 00:03:25 Duration
Lecture 12 Digital Signature 00:02:48 Duration
Lecture 13 Signing and Verification Process 00:05:34 Duration
Lecture 14 How to check the Integrity of a Message 00:05:46 Duration

Section 8 : Security Measures

Lecture 1 Security Measures 00:03:03 Duration
Lecture 2 What is Firewall 00:12:13 Duration
Lecture 3 Types of Firewall Packet Filter 00:06:32 Duration
Lecture 4 Types of Firewall Stateful Inspection Firewall 00:05:04 Duration
Lecture 5 Types of Firewall Proxy-server firewall 00:04:44 Duration

Section 9 : Cyber Law

Lecture 1 Cyber Law 00:01:46 Duration
Lecture 2 Why there is a need for Cyber Law 00:03:19 Duration
Lecture 3 What is Cyber Crime 00:03:47 Duration
Lecture 4 Classification of Cyber Crime 00:01:24 Duration
Lecture 5 Cyber Crimes Against Person - Cyber Stalking 00:02:24 Duration
Lecture 6 Cyber Crimes Against Person - Dissemination of obscene Material 00:01:50 Duration
Lecture 7 Cyber Crimes Against Person - Defamation 00:01:16 Duration
Lecture 8 Cyber Crimes Against Person - Hacking 00:01:28 Duration
Lecture 9 Cyber Crimes Against Person - Cracking 00:02:46 Duration
Lecture 10 Cyber Crimes Against Person - Email and SMS Spoofing 00:03:54 Duration
Lecture 11 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 12 Cyber Crimes Against Person - Carding 00:01:32 Duration
Lecture 13 Cyber Crimes Against Person - Cheating and Fraud 00:04:25 Duration
Lecture 14 Cyber Crimes Against Person - Assault by Threat 00:01:25 Duration
Lecture 15 Cyber Crime Against Persons Property 00:11:33 Duration
Lecture 16 Cyber Crime against Government 00:05:44 Duration
Lecture 17 Cyber Crime against Society at Large 00:04:34 Duration

Section 10 : Digital Forensics

Lecture 1 Definition of Digital Forensics 00:04:46 Duration
Lecture 2 Process of Digital Forensics 00:08:20 Duration
Lecture 3 Types of Digital Forensics 00:01:57 Duration