Section 1 : Introduction

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 2 About A+ copy 2:15
Lecture 3 Exam Info 4:10
Lecture 4 How to use this course 1:42
Lecture 5 How to build the lab for this course 10:54

Section 2 : Operating System Basics

Lecture 6 Intro to Operating Systems 1:30
Lecture 7 32 Bit vs 64 Bit 6:10
Lecture 8 Open vs Close Source OS 3:30

Section 3 : Installing and Configuring Windows

Lecture 9 Different Versions of Windows 6:21
Lecture 10 Windows Home vs Pro 4:53
Lecture 11 Compatibility mode in Windows 3:16
Lecture 12 Upgrade vs Clean install 4:30
Lecture 13 Downloading and Installing VirtualBox 2:45
Lecture 14 Installing Windows 7 on Virtualbox 14:18
Lecture 15 Installing Windows 10 on Virtualbox 9:45
Lecture 16 Other Ways to install Windows 10:39
Lecture 17 What should be done after installing Windows 7:2

Section 4 : Managing Hard Drives in Windows

Lecture 18 What are partitions 5:17
Lecture 19 GPT vs 13:21
Lecture 20 Mirror vs Spanned vs Striped 17:12
Lecture 21 Windows File System Types 9:11
Lecture 22 Other File systems 2:40
Lecture 23 Creating NTFS and FAT32 partition 6:28
Lecture 24 Using Convert to convert Fat32 to NTFS 2:35
Lecture 25 Format from NTFS to Fat32 2:3
Lecture 26 Using Diskpart 5:42
Lecture 27 Changing a drive letter and Storage Spaces 8:6
Lecture 28 Extending and Splitting Partitions 7:16
Lecture 29 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 5 : Windows Utilities

Lecture 30 Control Panel Utilities 13:43
Lecture 31 Uninstalling Applications 2:17
Lecture 32 Task Manager 7:46
Lecture 33 Using Performance and Resource Monitor 4:29
Lecture 34 How to Access the Registry 1:33
Lecture 35 Managing Windows Services 3:58
Lecture 36 Computer Management 5:48
Lecture 37 Managing user accounts 4:11
Lecture 38 Creating and Updating Group Policies 7:56
Lecture 39 Component and Data Services 3:21
Lecture 40 MSConfig 4:52
Lecture 41 Using Advanced Startup 5:15
Lecture 42 Using Dxdiag 2:29
Lecture 43 Using MSinfo32 1:2
Lecture 44 Using the Event Viewer 1:23
Lecture 45 Printer Management 4:50
Lecture 46 Using the MMC 1:39
Lecture 47 Working with Windows System Restore 2:56
Lecture 48 Windows Memory Diagnostics 2:6
Lecture 49 Using Task Scheduler to Run a Task 2:50

Section 6 : Windows Commands

Lecture 50 Using the command prompt 5:37
Lecture 51 Using the SFC Command 1:27
Lecture 52 Using copy commands in Windows 4:46
Lecture 53 Using DISM and Shutdown Command 4:22
Lecture 54 Using the Bootrec command
Lecture 55 Using TaskList and TaskKill Commands 3:2
Lecture 56 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 57 Using the Net User Command 3:13

Section 7 : Windows Networking

Lecture 58 Workgroup vs Domains 10:35
Lecture 59 Homegroups 3:41
Lecture 60 Windows Network Connections 5:43
Lecture 61 Network Profiles 3:47
Lecture 62 Sharing Network Folders and Printers 14:47
Lecture 63 Using Remote Desktop and Remote assistance 9:6
Lecture 64 Setting up a computer on a domain 5:33
Lecture 65 Configure Static IP Address in Windows 2:47
Lecture 66 Using ipconfig command
Lecture 67 Viewing and Flushing the DNS Cache with ipconfig 3:38
Lecture 68 Using the Ping command
Lecture 69 Using the Tracert Command in Windows 2:7
Lecture 70 Using the ARP command 2:34
Lecture 71 Using Netstat and Nslookup 3:3
Lecture 72 Using Internet Options and Proxy Setting 3:19
Lecture 73 NIC Card Setting 7:20
Lecture 74 Configuring Windows Firewall 4:17

Section 8 : Linux and Mac Administration

Lecture 75 Linux OS 3:10
Lecture 76 Installing Ubuntu in Virtualbox 10:14
Lecture 77 Navigating Linux 5:21
Lecture 78 Basic Linux Commands 17:31
Lecture 79 Using apt-get in Linux 1:29
Lecture 80 Using apt-get install command in Linux
Lecture 81 Using ifconfig on Linux 6:28
Lecture 82 Other Linux Commands 9:58
Lecture 83 Managing Linux Permissions 15:56
Lecture 84 Mac OS Best Practices and tools 7:19
Lecture 85 Mac OS Features 6:2

Section 9 : Security

Lecture 86 Physical Security Controls 9:9
Lecture 87 Managing Active Directory User Accounts 18:39
Lecture 88 Logical Security Concepts 26:5
Lecture 89 Wireless Security Protocols and Authentication methods 12:53
Lecture 90 Different Types of Malware 8:13
Lecture 91 Malware Protection 10:11
Lecture 92 Social engineering
Lecture 93 What is a DOS, DDOS and Zombie 5:36
Lecture 94 Man-in-the-middle 4:39
Lecture 95 Cracking Passwords 8:1
Lecture 96 Spoofing 2:41
Lecture 97 Non-Compliant Systems 1:46
Lecture 98 Windows Security Setting 26:12
Lecture 99 Best Practices to secure a workstation 12:27
Lecture 100 Securing Mobile Devices 11:46
Lecture 101 Data Destruction and Disposal 8:54
Lecture 102 Securing SOHO wireless and wired networks 10:5

Section 10 : Software Troubleshooting

Lecture 103 Fixing Windows OS Problems 13:49
Lecture 104 Troubleshoot and resolve PC security issues 13:24
Lecture 105 Best practice procedures for malware removal 10:36
Lecture 106 Mobile OS and Application Issues 7:14
Lecture 107 Mobile OS and Application Security Issues 4:57

Section 11 : Operational Procedures

Lecture 108 Different Types of Documentations 9:52
Lecture 109 Change Management Best Practices 7:57
Lecture 110 Basic disaster prevention and recovery methods 9:42
Lecture 111 Safety procedures 7:46
Lecture 112 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 113 Incidents, privacy and licenses 7:46
Lecture 114 Communication techniques and professionalism 13:36
Lecture 115 Basics of scripting 12:4
Lecture 116 Remote access technologies 3:19

Section 12 : Performance Based Questions

Lecture 117 Performance Based Questions 2:2
Lecture 118 PBQ Using IPconfig 2:5
Lecture 119 PBQ Using MSConfig to disable services 2:6
Lecture 120 PBQ - Malware Procedures 2:10
Lecture 121 PBQ - Changing Internet options 1:40
Lecture 122 PBQ Bootrec 4:19
Lecture 123 PBQ - Setting up an Email on a mobile Device 4:48