Section 1 : Introduction

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 2 Introduce Yourself To Your Fellow Students And Tell Everyone What Are Your Goals Text
Lecture 3 About Certification Pdf
Lecture 4 Preview The 87 Page Cyber Security Awareness Workbook You Get With This Course 2:33

Section 2 : Introduction to Cybersecurity

Lecture 5 About Proctor Testing Pdf
Lecture 6 Introduction of Facilitator
Lecture 7 Is our Data really safe on internet 0:55
Lecture 8 What is Cybersecurity 1:20
Lecture 9 Evolution of Cyber Threats 3:42
Lecture 10 Three Types of Security Goals 5:12
Lecture 11 Importance of Cybersecurity 3:21
Lecture 12 Threat, Vulnerability, and Risk 2:11
Lecture 13 Networking Devices Router 2:19
Lecture 14 Networking Devices Switch 1:41
Lecture 15 What is an IP Address 2:44
Lecture 16 What is a MAC Address 2:43
Lecture 17 What is a PORT Address 2:16
Lecture 18 What is a DNS 4:48
Lecture 19 What is a VPN 2:8
Lecture 20 What is a Virus
Lecture 21 Learn Hacking and the different Types of Hackers 4:39
Lecture 22 Job Profiles in the field of Cybersecurity 1:28
Lecture 23 Important Cybersecurity Skills 5:24

Section 3 : Fundamentals of Networking

Lecture 24 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 25 Computer Networks 2:28
Lecture 26 The OSI Model 3:27
Lecture 27 OSI Model Application Layer 1:59
Lecture 28 OSI Model Presentation Layer 3:28
Lecture 29 OSI Model Session Layer 3:58
Lecture 30 OSI Model Transport Layer 4:52
Lecture 31 OSI Model Network Layer
Lecture 32 OSI Model Data Link Layer 2:42
Lecture 33 OSI Model Physical Layer 1:14
Lecture 34 OSI Layers Example 1:4
Lecture 35 OSI Layers Protocols 2:32
Lecture 36 HTTP Protocol 10:0
Lecture 37 About Certification Pdf
Lecture 38 TCP Protocol 4:38
Lecture 39 UDP Protocol 5:50
Lecture 40 Difference between UDP and TCP Protocol 2:17
Lecture 41 DHCP Protocol 9:20
Lecture 42 ARP Protocol 4:51
Lecture 43 What is an IP address and its types 7:1
Lecture 44 What is a Port Address and its types 4:10
Lecture 45 Network Troubleshooting 9:14

Section 4 : Types of Attacks part 1

Lecture 46 What is an Attack 2:24
Lecture 47 Categories of Cyber Attacks 9:6
Lecture 48 Types of Attacks 0:50
Lecture 49 Password attack and its types 9:34
Lecture 50 Malware Attack 1:42
Lecture 51 Types of Malware Worms 2:4
Lecture 52 Types of Malware Viruses 2:42
Lecture 53 Types of Malware Trojan 2:29
Lecture 54 Types of Malware Adware 2:33
Lecture 55 Types of Malware Spyware 1:5
Lecture 56 Types of Malware Crimeware 2:12
Lecture 57 Types of Malware Rootkit 2:2
Lecture 58 Types of Malware Ransomware 3:28
Lecture 59 Man in the Middle Attack 3:42
Lecture 60 Man in the Middle Attack Example 4:49
Lecture 61 Sniffing Attack
Lecture 62 DOS Attack 10:50
Lecture 63 DOS Attack Example 2:13

Section 5 : Types of Attacks part 2

Lecture 64 What is DDOS Attack 5:10
Lecture 65 DDOS Attack Example 11:46
Lecture 66 Phishing Attack 7:40
Lecture 67 Phishing Attack Example 1:27
Lecture 68 SQL Injection Attack 1:53
Lecture 69 Example of SQL Injection Attack 4:40
Lecture 70 Cross-site Scripting Attack 6:17
Lecture 71 Post Scanning Attack 7:9

Section 6 : Cryptography part 1

Lecture 72 What is Cryptology 2:45
Lecture 73 The Need for Cryptography 3:13
Lecture 74 Basic Cryptography System
Lecture 75 What is Encryption 1:48
Lecture 76 What is Decryption 1:14
Lecture 77 Define Plain text 0:35
Lecture 78 About Proctor Testing Pdf
Lecture 79 What is Secret Key 0:42
Lecture 80 What is Cipher text 1:22
Lecture 81 Cryptography System 4:19
Lecture 82 Cryptography in everyday life 7:49
Lecture 83 Types of Cryptography 1:43
Lecture 84 Symmetric Key Cryptography 6:35
Lecture 85 Asymmetric Key Cryptography 8:51
Lecture 86 What is Hashing 6:42
Lecture 87 Hashing Algorithm 2:8
Lecture 88 Techniques of Hashing 10:22

Section 7 : Cryptography part 2

Lecture 89 What is Substitution Cipher 4:2
Lecture 90 What is Transposition Cipher 2:11
Lecture 91 Cesar Cipher and how it works 7:46
Lecture 92 Example of Cesar Cipher 4:8
Lecture 93 Transposition Cipher 1:41
Lecture 94 Example of Transposition Cipher 4:18
Lecture 95 Stream Cipher 4:33
Lecture 96 Block Cipher 3:39
Lecture 97 Advantages of Symmetric Key Cryptography 2:13
Lecture 98 Why Asymmetric key cryptography is important 2:9
Lecture 99 Advantages of Asymmetric Key Cryptography 3:25
Lecture 100 Digital Signature 2:48
Lecture 101 Signing and Verification Process 5:34
Lecture 102 How to check the Integrity of a Message 5:46

Section 8 : Security Measures

Lecture 103 Security Measures 3:3
Lecture 104 What is Firewall 12:13
Lecture 105 Types of Firewall Packet Filter 6:32
Lecture 106 Types of Firewall Stateful Inspection Firewall 5:4
Lecture 107 Types of Firewall Proxy-server firewall 4:44

Section 9 : Cyber Law

Lecture 108 Cyber Law 1:46
Lecture 109 Why there is a need for Cyber Law 3:19
Lecture 110 What is Cyber Crime 3:47
Lecture 111 Classification of Cyber Crime 1:24
Lecture 112 Cyber Crimes Against Person - Cyber Stalking 2:24
Lecture 113 Cyber Crimes Against Person - Dissemination of obscene Material 1:50
Lecture 114 Cyber Crimes Against Person - Defamation 1:16
Lecture 115 Cyber Crimes Against Person - Hacking 1:28
Lecture 116 Cyber Crimes Against Person - Cracking 2:46
Lecture 117 Cyber Crimes Against Person - Email and SMS Spoofing 3:54
Lecture 118 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 119 Cyber Crimes Against Person - Carding 1:32
Lecture 120 Cyber Crimes Against Person - Cheating and Fraud 4:25
Lecture 121 Cyber Crimes Against Person - Assault by Threat 1:25
Lecture 122 Cyber Crime Against Persons Property 11:33
Lecture 123 Cyber Crime against Government 5:44
Lecture 124 Cyber Crime against Society at Large 4:34

Section 10 : Digital Forensics

Lecture 125 Definition of Digital Forensics 4:46
Lecture 126 Process of Digital Forensics 8:20
Lecture 127 Types of Digital Forensics 1:57