Section 1 : Chapter 1

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM

Section 2 : Introduction to Ethical Hacking

Lecture 1 Introduction to Ethical Hacking 00:10:00 Duration
Lecture 2 Vulnerabilities 00:06:58 Duration
Lecture 3 Defense-in-depth 00:03:25 Duration
Lecture 4 Penetration Testing 00:07:28 Duration
Lecture 5 Pentesting Demo 1 00:05:17 Duration
Lecture 6 Pentesting Demo 2 00:02:20 Duration
Lecture 7 Pentesting Demo 3 00:03:11 Duration
Lecture 8 Pentesting Demo 4 00:04:56 Duration
Lecture 9 Methodology for Penetration TestingEthical Hacking 00:02:38 Duration
Lecture 10 Vulnerability Management 00:01:15 Duration
Lecture 11 Incident Management 00:02:41 Duration
Lecture 12 Security Policy 00:01:52 Duration
Lecture 13 Conclusion 00:00:56 Duration

Section 3 : Disaster Recovery and Risk Management

Lecture 1 Defining Risk Management 00:02:15 Duration
Lecture 2 Strategies For Managing Risk 00:02:12 Duration
Lecture 3 How to Analyze Risk 00:05:23 Duration
Lecture 4 Risk Assessment Demo 00:18:16 Duration
Lecture 5 DR Strategies 00:05:03 Duration
Lecture 6 Plan Testing and Execution 00:02:15 Duration
Lecture 7 Conclusion 00:01:00 Duration

Section 4 : Penetration Testing

Lecture 1 Security Auditing 00:05:49 Duration
Lecture 2 Penetration Testing Types 00:04:32 Duration
Lecture 3 Vulnerability Assessment Demo 00:10:36 Duration
Lecture 4 Areas of Pentest 00:04:45 Duration
Lecture 5 Awareness and Compliance 00:01:37 Duration
Lecture 6 Educating Employees 00:01:26 Duration
Lecture 7 Conclusion 00:01:05 Duration

Section 5 : Vulnerability Assessment

Lecture 1 Introduction 00:02:34 Duration
Lecture 2 Testing Overview 00:00:51 Duration
Lecture 3 Security Alerts 00:04:09 Duration
Lecture 4 Scanners 00:04:21 Duration
Lecture 5 Nessus Demo
Lecture 6 IBM AppScan Demo 00:02:54 Duration
Lecture 7 GFI Languard Demo 00:01:34 Duration
Lecture 8 Analyzing the Scan Results 00:04:32 Duration
Lecture 9 Generating Reports 00:01:55 Duration
Lecture 10 Remediation 00:07:47 Duration
Lecture 11 Patch Management 00:01:28 Duration
Lecture 12 Conclusion 00:01:04 Duration

Section 6 : Physical Security

Lecture 1 Introduction 00:00:46 Duration
Lecture 2 Importance of Physical Security 00:03:34 Duration
Lecture 3 Physical Security Planning 00:04:49 Duration
Lecture 4 CPTED 00:06:52 Duration
Lecture 5 Protecting Assets 00:01:45 Duration
Lecture 6 Introduction 00:02:38 Duration
Lecture 7 Power Supply and Protection 00:06:43 Duration
Lecture 8 Environment Control 00:02:46 Duration
Lecture 9 Fire Prevention, Detection, and Suppression 00:03:41 Duration
Lecture 10 Perimeter Security 00:03:28 Duration
Lecture 11 External Boundary Protection 00:01:38 Duration
Lecture 12 Locks and Fencing 00:01:36 Duration
Lecture 13 Lighting and Patrols 00:02:51 Duration
Lecture 14 Surveillance Devices 00:01:11 Duration
Lecture 15 Intrusion Detection Systems 00:01:50 Duration
Lecture 16 Auditing Physical Security 00:00:52 Duration
Lecture 17 Testing and Drills 00:01:12 Duration
Lecture 18 Conclusion 00:00:39 Duration

Section 7 : Footprinting

Lecture 1 Introduction 00:01:14 Duration
Lecture 2 FootprintingReconnaissance 00:04:34 Duration
Lecture 3 Knowledge Check Possible Threats of Footprinting 00:01:17 Duration
Lecture 4 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Lecture 5 Knowledge Check Information Gathering Groups 00:01:58 Duration
Lecture 6 Footprinting Hierarchy 00:01:08 Duration
Lecture 7 WHOIS Footprinting Demo 00:01:53 Duration
Lecture 8 Footprinting Methodology 00:02:42 Duration
Lecture 9 Passive vs 00:04:39 Duration
Lecture 10 Knowledge Check WHOIS Databases 00:01:30 Duration
Lecture 11 Knowledge Check DNS Zone Data 00:02:00 Duration
Lecture 12 Social Engineering 00:08:03 Duration
Lecture 13 Footprinting with Google 00:01:57 Duration
Lecture 14 Google Hacking 00:00:50 Duration
Lecture 15 Exploit Database Demo 00:01:19 Duration
Lecture 16 Google Hacking for Charity Demo
Lecture 17 Google Advance Search Operations 00:01:49 Duration
Lecture 18 Google Hacking Tools 00:03:00 Duration
Lecture 19 Footprinting Tools 00:01:13 Duration
Lecture 20 Maltego Demo 00:01:42 Duration
Lecture 21 Additional Footprinting Tools 00:00:46 Duration
Lecture 22 Footprinting Countermeasures 00:02:18 Duration
Lecture 23 Footprinting PenTesting 00:03:03 Duration
Lecture 24 Conclusion 00:01:55 Duration

Section 8 : Reconnaissance

Lecture 1 Introduction 00:01:51 Duration
Lecture 2 Reconnaissance Threats 00:03:11 Duration
Lecture 3 7 Steps of Information Gathering 00:06:25 Duration
Lecture 4 Footprinting Methodology 00:02:37 Duration
Lecture 5 Passive vs 00:03:07 Duration
Lecture 6 Passive Footprinting Tools 00:00:23 Duration
Lecture 7 PassiveRecon Demo 00:02:01 Duration
Lecture 8 Shodanhq 00:00:41 Duration
Lecture 9 Active Footprinting 00:02:35 Duration
Lecture 10 Visualroute Trace Demo 00:00:46 Duration
Lecture 11 Scanning Networks and Ports 00:05:40 Duration
Lecture 12 Nmap Scan Demo 00:01:41 Duration
Lecture 13 Enumeration 00:01:25 Duration
Lecture 14 Reconnaissance Countermeasures 00:02:15 Duration
Lecture 15 Conclusion 00:01:06 Duration

Section 9 : Scanning Networks

Lecture 1 Defining Private and Public Scanning 00:00:52 Duration
Lecture 2 Techniques for Private Network Scanning 00:02:27 Duration
Lecture 3 Angry IP Demo 00:06:45 Duration
Lecture 4 Nmap Demo 00:04:20 Duration
Lecture 5 Hping Demo 00:03:14 Duration
Lecture 6 Public Scanning with Zmap 00:02:31 Duration
Lecture 7 Zmap Demo 00:04:53 Duration
Lecture 8 Conclusion 00:00:41 Duration

Section 10 : Port Scanning

Lecture 1 Introduction to Port Scanning 00:03:53 Duration
Lecture 2 Port Scanning Methods 00:04:34 Duration
Lecture 3 Ping Demo 00:03:26 Duration
Lecture 4 Ping Tester Demo 00:04:04 Duration
Lecture 5 Well-Known Ports 00:03:16 Duration
Lecture 6 Netstat Demo 00:03:05 Duration
Lecture 7 Informational Sites 00:00:58 Duration
Lecture 8 Port Scanning Techniques I 00:11:13 Duration
Lecture 9 Nmap Demo 00:01:39 Duration
Lecture 10 Scans and Firewalls 00:10:11 Duration
Lecture 11 Nmap Version Detection Demo 00:04:33 Duration
Lecture 12 UDP 00:03:23 Duration
Lecture 13 Advanced Scanning Techniques 00:02:43 Duration
Lecture 14 Port Scanning Tools 00:05:33 Duration
Lecture 15 Port Scanning Techniques II 00:03:58 Duration
Lecture 16 Port Scanning Countermeasures 00:03:18 Duration
Lecture 17 Conclusion 00:01:23 Duration

Section 11 : Banner Grabbing

Lecture 1 Introduction 00:00:50 Duration
Lecture 2 What is Banner Grabbing 00:03:52 Duration
Lecture 3 Types of Banner Grabbing 00:02:35 Duration
Lecture 4 Banner Grabbing Tools 00:03:43 Duration
Lecture 5 Banner Grabbing Using Telnet Demo 00:01:46 Duration
Lecture 6 Countermeasures 00:01:29 Duration
Lecture 7 Conclusion 00:00:50 Duration

Section 12 : Enumeration

Lecture 1 Introduction 00:00:57 Duration
Lecture 2 Applications 00:01:42 Duration
Lecture 3 NetBIOS Demo 00:04:12 Duration
Lecture 4 SNMP 00:02:37 Duration
Lecture 5 LDAP 00:00:42 Duration
Lecture 6 LDAP Demo 00:03:28 Duration
Lecture 7 NTP 00:01:05 Duration
Lecture 8 SMTP 00:01:29 Duration
Lecture 9 DNS Enumeration 00:01:33 Duration
Lecture 10 NSlookup Demo 00:02:24 Duration
Lecture 11 Conclusion 00:00:33 Duration

Section 13 : Linux Fundamentals

Lecture 1 Linux History 00:01:48 Duration
Lecture 2 GUI & Shell 00:04:43 Duration
Lecture 3 Linux Shell 00:01:27 Duration
Lecture 4 Managing Files and Directories 00:01:08 Duration
Lecture 5 Root Enable Disable Demo 00:03:17 Duration
Lecture 6 Linux Commands 00:03:30 Duration
Lecture 7 Navigating in Linux 00:03:12 Duration
Lecture 8 Linux Navigation Demo 00:06:15 Duration
Lecture 9 Tar 00:02:28 Duration
Lecture 10 Compression Demo 00:03:18 Duration
Lecture 11 Configuring Subdirectories 00:03:13 Duration
Lecture 12 Vi Demo 00:04:06 Duration
Lecture 13 Conclusion 00:00:51 Duration

Section 14 : Configuring Linux for Pentesting

Lecture 1 Installing Applications 00:02:05 Duration
Lecture 2 apt-get Demo 00:03:08 Duration
Lecture 3 Applications for Pentesting 00:01:42 Duration
Lecture 4 Essential Tools and GUI Demo 00:07:55 Duration
Lecture 5 Iptables 00:01:00 Duration
Lecture 6 Iptables Demo 00:09:26 Duration
Lecture 7 IP Forwarding Demo 00:03:01 Duration
Lecture 8 Conclusion 00:00:54 Duration

Section 15 : Authentication Systems

Lecture 1 Authentication Factors 00:01:54 Duration
Lecture 2 Forms of Authentication 00:03:52 Duration
Lecture 3 Introduction to Authentication Protocols 00:01:08 Duration
Lecture 4 CHAP and MS-CHAP 00:02:44 Duration
Lecture 5 NTLM 00:05:53 Duration
Lecture 6 NTLM Continued 00:03:30 Duration
Lecture 7 Authentication Methods Demo 00:13:03 Duration
Lecture 8 Triple As 00:01:25 Duration
Lecture 9 RADIUS Demo 00:06:09 Duration
Lecture 10 RADIUS 2 Demo
Lecture 11 LDAP 00:02:58 Duration
Lecture 12 Single Sign-on 00:01:59 Duration
Lecture 13 Conclusion 00:01:35 Duration

Section 16 : System Hacking

Lecture 1 Introduction 00:01:49 Duration
Lecture 2 Types of Password Attacks 00:02:29 Duration
Lecture 3 Password Guessing 00:03:38 Duration
Lecture 4 Password Hashing and Encryption 00:10:35 Duration
Lecture 5 Password Cracking Technique
Lecture 6 Privilege Escalation 00:01:14 Duration
Lecture 7 Countermeasures 00:05:11 Duration
Lecture 8 Knowledge Check 00:00:44 Duration
Lecture 9 Hiding Files with NTFS 00:02:55 Duration
Lecture 10 Knowledge Check 00:00:49 Duration
Lecture 11 Steganography and Its Uses 00:05:37 Duration
Lecture 12 Knowledge Check 00:00:33 Duration
Lecture 13 Understanding Rootkits 00:03:36 Duration
Lecture 14 Knowledge Check 00:00:31 Duration
Lecture 15 Conclusion 00:01:55 Duration

Section 17 : Spyware & Keyloggers

Lecture 1 Introduction 00:07:24 Duration
Lecture 2 Spyware Distribution 00:13:59 Duration
Lecture 3 Knowledge Check 00:00:43 Duration
Lecture 4 Understanding Keyloggers 00:01:33 Duration
Lecture 5 Hardware Keyloggers 00:03:27 Duration
Lecture 6 Software Keylogger 00:02:54 Duration
Lecture 7 Keylogger Examples 00:11:27 Duration
Lecture 8 Kernel Keyloggers 00:01:44 Duration
Lecture 9 Protecting Yourself 00:14:13 Duration
Lecture 10 Knowledge Check 00:00:36 Duration
Lecture 11 Conclusion 00:01:01 Duration

Section 18 : Covering Tracks

Lecture 1 Dealing with Windows Logs 00:06:01 Duration
Lecture 2 Working with WinZapper
Lecture 3 MRU-Blaster 00:01:53 Duration
Lecture 4 Using Metasploit to Cover Tracks 00:01:46 Duration
Lecture 5 Meterpreter Event Manager Demo 00:02:25 Duration
Lecture 6 Meterpreter Timestomp Demo 00:01:54 Duration
Lecture 7 Linux History and Events 00:02:21 Duration
Lecture 8 Clearing the Bash History Demo 00:03:30 Duration
Lecture 9 Clearing Linux Events Demo 00:02:16 Duration
Lecture 10 File Shredding 00:01:35 Duration
Lecture 11 Anonymity 00:03:27 Duration
Lecture 12 Using Live CDs, Proxies, and Onion routers 00:02:32 Duration
Lecture 13 Countermeasures 00:02:58 Duration
Lecture 14 Conclusion 00:00:47 Duration

Section 19 : Trojans and Backdoors

Lecture 1 Introduction 00:01:31 Duration
Lecture 2 Definition and Distribution 00:07:50 Duration
Lecture 3 Capabilities 00:08:25 Duration
Lecture 4 Malware Knowledge Check 00:00:41 Duration
Lecture 5 Backdoors 00:05:45 Duration
Lecture 6 Trojans 00:12:06 Duration
Lecture 7 Wrappers 00:07:21 Duration
Lecture 8 Avoiding Detection 00:03:15 Duration
Lecture 9 Tools of the Trade Knowledge Check 00:00:32 Duration
Lecture 10 Countermeasure Considerations 00:05:44 Duration
Lecture 11 Investigation Tools 00:01:30 Duration
Lecture 12 Port Monitorization 00:01:30 Duration
Lecture 13 System File Monitorization 00:01:21 Duration
Lecture 14 Software Restriction Policies 00:04:34 Duration
Lecture 15 Additional Countermeasure Tools 00:01:28 Duration
Lecture 16 Countermeasures Knowledge Check 00:00:49 Duration
Lecture 17 Conclusion 00:01:58 Duration

Section 20 : Viruses and Worms

Lecture 1 Virus Definition and Behavior 00:02:38 Duration
Lecture 2 DELme Demo 00:04:49 Duration
Lecture 3 Viruses 00:00:51 Duration
Lecture 4 Virus Types 00:09:14 Duration
Lecture 5 JPS Demo 00:03:50 Duration
Lecture 6 Stealth Strategies and Infection 00:04:36 Duration
Lecture 7 Virus Mutation Demo 00:02:55 Duration
Lecture 8 Virus Infection 00:02:05 Duration
Lecture 9 Viruses Examples 00:02:28 Duration
Lecture 10 Defining Worms 00:01:31 Duration
Lecture 11 IT Security Fundamentals- CompTIA Security+ 2015 SY0-401- Course Map
Lecture 12 Known Dangerous Worms 00:11:17 Duration
Lecture 13 Conclusion 00:00:49 Duration

Section 21 : Sniffers

Lecture 1 Packet Sniffers 00:15:27 Duration
Lecture 2 Wireshark Demo 00:09:30 Duration
Lecture 3 Sniffing Passive vs Active 00:02:31 Duration
Lecture 4 Techniques for Poisoning the Network 00:03:38 Duration
Lecture 5 ARP Poisoning Demo 00:10:33 Duration
Lecture 6 Sniffing and Spoofing Tools 00:10:15 Duration
Lecture 7 Countermeasures 00:01:14 Duration
Lecture 8 XARP Demo 00:03:08 Duration
Lecture 9 Cisco Switch Security Configuration 00:01:43 Duration
Lecture 10 Conclusion 00:01:06 Duration

Section 22 : Social Engineering

Lecture 1 Introduction 00:01:35 Duration
Lecture 2 Security Policy 00:01:24 Duration
Lecture 3 Human-based Attacks 00:02:29 Duration
Lecture 4 Piggybacking 00:03:47 Duration
Lecture 5 Computer-based Attacks 00:01:12 Duration
Lecture 6 Phishing Email Demo 00:04:33 Duration
Lecture 7 SET-webTemplate Demo 00:07:12 Duration
Lecture 8 SET-spear phishing Demo 00:04:37 Duration
Lecture 9 SET-trojan Demo 00:04:17 Duration
Lecture 10 SET-SMS Spoofing Demo 00:02:21 Duration
Lecture 11 Using Social Media 00:00:58 Duration
Lecture 12 Conclusion 00:00:52 Duration

Section 23 : Denial of Service

Lecture 1 Introduction 00:02:29 Duration
Lecture 2 2014 DDoS Attacks and Impact Report 00:04:31 Duration
Lecture 3 DoS and Distributed DoS 00:04:43 Duration
Lecture 4 Distributed DoS 00:03:12 Duration
Lecture 5 DoS Impact 00:01:19 Duration
Lecture 6 Distributed DoS Attack Symptoms 00:00:46 Duration
Lecture 7 Digital Attack Map Demo 00:02:55 Duration
Lecture 8 DoS, DDoS Attacks 00:07:00 Duration
Lecture 9 Introduction to Botnets 00:02:19 Duration
Lecture 10 Botnet Ecosystem 00:08:06 Duration
Lecture 11 Botnet Propagation 00:02:08 Duration
Lecture 12 Botnet Tools 00:02:01 Duration
Lecture 13 DDoS Tools 00:00:42 Duration
Lecture 14 HOIC Demo 00:01:27 Duration
Lecture 15 DoS Attack Detection 00:00:57 Duration
Lecture 16 Activity Profiling 00:00:59 Duration
Lecture 17 Sequential Change-Point Detection 00:00:57 Duration
Lecture 18 Wavelet Analysis 00:00:36 Duration
Lecture 19 DoS, DDoS Countermeasures 00:08:11 Duration
Lecture 20 Botnet Countermeasures 00:01:09 Duration
Lecture 21 Advanced DoS, DDoS Protection Tools 00:03:02 Duration
Lecture 22 DDoS in Penetration Testing 00:01:57 Duration
Lecture 23 Advanced DDoS Protection Method 00:00:42 Duration
Lecture 24 Conclusion 00:02:00 Duration

Section 24 : Session Hijacking

Lecture 1 Introduction 00:05:40 Duration
Lecture 2 Contributors to Session Hijacking 00:02:32 Duration
Lecture 3 Impact of Session Hijacking 00:00:53 Duration
Lecture 4 Session Hijacking Strategies 00:02:24 Duration
Lecture 5 Session Hijacking Process 00:02:57 Duration
Lecture 6 Types of Session Hijacking 00:11:47 Duration
Lecture 7 Session Hijacking Tools 00:00:50 Duration
Lecture 8 ZAP Tool Demo 00:04:52 Duration
Lecture 9 Burp Suite Demo 00:07:39 Duration
Lecture 10 TamperIE Demo 00:07:50 Duration
Lecture 11 Protection Against Session Hijacking 00:02:44 Duration
Lecture 12 IP Security Architecture 00:01:53 Duration
Lecture 13 Penetration Testing in Session Hijacking 00:04:09 Duration
Lecture 14 Conclusion 00:01:37 Duration

Section 25 : Hacking Web and App Servers

Lecture 1 Gathering Information 00:01:29 Duration
Lecture 2 Apache2 Demo 00:09:16 Duration
Lecture 3 Netcraft Demo 00:05:20 Duration
Lecture 4 Website Mirroring Demo 00:03:43 Duration
Lecture 5 Web server Attacks 00:04:07 Duration
Lecture 6 W3AF Demo 00:05:05 Duration
Lecture 7 Vulnerabilites 00:04:48 Duration
Lecture 8 WMAP Demo 00:05:23 Duration
Lecture 9 Conclusion 00:00:46 Duration

Section 26 : Advanced Exploitation Techniques

Lecture 1 Introduction to Exploits 00:04:03 Duration
Lecture 2 Metasploit 00:02:19 Duration
Lecture 3 Metasploit Demo 00:04:00 Duration
Lecture 4 Understanding Metasploit 00:05:50 Duration
Lecture 5 Armitage 00:02:00 Duration
Lecture 6 Meterpreter Demo 00:08:22 Duration
Lecture 7 Metasploit 00:01:53 Duration
Lecture 8 Armitage Demo 00:04:45 Duration
Lecture 9 Hands on Metasploit 00:01:03 Duration
Lecture 10 Exploiting Vulnerabilities 00:01:41 Duration
Lecture 11 Payload 00:01:43 Duration
Lecture 12 Armitage-mimkatz Demo 00:04:27 Duration
Lecture 13 Core Impact Pro 00:02:54 Duration
Lecture 14 Conclusion 00:01:02 Duration

Section 27 : SQL Injections

Lecture 1 Introduction to SQL Injections 00:05:29 Duration
Lecture 2 SQL Injection Methodology 00:05:22 Duration
Lecture 3 SQL Injection Attacks 00:05:16 Duration
Lecture 4 SQL Injection Detection 00:01:12 Duration
Lecture 5 Buffer Overflow Exploit 00:01:02 Duration
Lecture 6 BSQL Tool Demo 00:01:45 Duration
Lecture 7 SQL Injection Username and Password Demo 00:04:04 Duration
Lecture 8 Testing for SQL Injection 00:01:37 Duration
Lecture 9 Countermeasures 00:02:49 Duration
Lecture 10 SQL Injection Detection Tools 00:00:55 Duration
Lecture 11 Conclusion 00:01:14 Duration

Section 28 : Wireless Types and Vulnerabilities

Lecture 1 Introduction 00:00:38 Duration
Lecture 2 Wireless Communication Systems 00:02:12 Duration
Lecture 3 Standards 00:04:40 Duration
Lecture 4 InSSIDer Demo 00:05:49 Duration
Lecture 5 Encryption Protocols 00:08:39 Duration
Lecture 6 WPA2 Encryption 00:02:53 Duration
Lecture 7 Systems 00:07:01 Duration
Lecture 8 Jammer Demo 00:02:25 Duration
Lecture 9 Fake AP Demo 00:02:44 Duration
Lecture 10 Attacks 00:05:04 Duration
Lecture 11 Capsa Demo 00:05:41 Duration
Lecture 12 Conclusion 00:00:39 Duration

Section 29 : Hacking Wireless Networks

Lecture 1 Introduction 00:02:02 Duration
Lecture 2 Aircrack Suite 00:03:59 Duration
Lecture 3 WEP Demo 00:10:15 Duration
Lecture 4 WPA2 Demo 00:05:48 Duration
Lecture 5 Using Reaver 00:01:25 Duration
Lecture 6 Using Windows 00:01:31 Duration
Lecture 7 Windows Hacking Demo 00:04:43 Duration
Lecture 8 DOS Demo 00:03:45 Duration
Lecture 9 Conclusion 00:00:41 Duration

Section 30 : Mobile Hacking Basics

Lecture 1 Introduction 00:01:18 Duration
Lecture 2 Rise of Mobility 00:04:55 Duration
Lecture 3 Areas to Consider 00:02:30 Duration
Lecture 4 Device Security 00:05:23 Duration
Lecture 5 Android Security Features Demo 00:07:29 Duration
Lecture 6 Lookout Demo 00:04:34 Duration
Lecture 7 Application Security 00:01:50 Duration
Lecture 8 Geo Tagging Demo 00:05:44 Duration
Lecture 9 Mobile Applications 00:04:37 Duration
Lecture 10 Sophos Demo 00:05:13 Duration
Lecture 11 Trend Micro Security Demo 00:04:43 Duration
Lecture 12 BYOD Concerns 00:01:52 Duration
Lecture 13 iScan Demo 00:04:01 Duration
Lecture 14 Options 00:04:04 Duration
Lecture 15 App Permissions Demo 00:04:56 Duration
Lecture 16 The Virtualization Option 00:01:52 Duration
Lecture 17 Conclusion 00:01:24 Duration

Section 31 : Evading Firewalls and Honeypots

Lecture 1 Introduction 00:01:14 Duration
Lecture 2 Understanding Firewalls 00:04:01 Duration
Lecture 3 Firewall Architectures 00:02:37 Duration
Lecture 4 Types of Firewalls 00:04:45 Duration
Lecture 5 Evading Firewalls 00:06:31 Duration
Lecture 6 Configuring Proxy Demo 00:01:17 Duration
Lecture 7 Evading Firewalls Using Tunneling 00:02:52 Duration
Lecture 8 Evading Firewalls Using External Systems 00:01:20 Duration
Lecture 9 Evading Firewalls Using MitM Attacks 00:01:17 Duration
Lecture 10 Firewall Evasion Tools 00:02:11 Duration
Lecture 11 Firewall Bypassing and Pentration Testing Demo 00:01:23 Duration
Lecture 12 Firewall Evasion Tools Continued 00:03:27 Duration
Lecture 13 Honeypots Defined 00:00:54 Duration
Lecture 14 Types of Honeypots 00:03:29 Duration
Lecture 15 Detecting Honeypots 00:02:09 Duration
Lecture 16 Honeypot Using Atomic Software Demo 00:01:49 Duration
Lecture 17 Countermeasures 00:01:31 Duration
Lecture 18 Penetration Testing 00:03:30 Duration
Lecture 19 Conclusion 00:01:10 Duration

Section 32 : Evading IDS

Lecture 1 Introduction 00:02:09 Duration
Lecture 2 Intrusion Detection Systems 00:04:21 Duration
Lecture 3 Introduction 00:00:39 Duration
Lecture 4 Encryption and Flooding 00:01:59 Duration
Lecture 5 Obfuscating 00:00:59 Duration
Lecture 6 Fragmentation Attack 00:01:40 Duration
Lecture 7 Overlapping Fragments 00:00:57 Duration
Lecture 8 Vulnerabilites 00:00:55 Duration
Lecture 9 How to Avoid IDS Demo 00:01:43 Duration
Lecture 10 Insertion Attack 00:00:52 Duration
Lecture 11 Evasion Attack 00:00:47 Duration
Lecture 12 Denial-of-Service Attack 00:02:17 Duration
Lecture 13 Application-Layer Attacks 00:00:56 Duration
Lecture 14 Time to Live Attacks 00:01:22 Duration
Lecture 15 False Positive Generation 00:00:36 Duration
Lecture 16 Urgency Flag 00:00:52 Duration
Lecture 17 Session Splicing 00:01:23 Duration
Lecture 18 Pre Connection SYN 00:01:08 Duration
Lecture 19 Post Connection SYN 00:01:50 Duration
Lecture 20 Snort 00:00:43 Duration
Lecture 21 More Tools 00:03:36 Duration
Lecture 22 Ways to Detect 00:02:56 Duration
Lecture 23 ADMutate 00:00:34 Duration
Lecture 24 Other Evading Tools 00:01:41 Duration
Lecture 25 Centralized Security Management 00:03:27 Duration
Lecture 26 IDS Penetration Testing 00:02:29 Duration
Lecture 27 Conclusion 00:00:46 Duration

Section 33 : Buffer Overflows

Lecture 1 Introduction to Buffer Overflow 00:03:14 Duration
Lecture 2 Stacks 00:04:25 Duration
Lecture 3 Stack Overflow Demo 00:01:57 Duration
Lecture 4 Heaps 00:02:06 Duration
Lecture 5 Heap Overflow Demo 00:02:04 Duration
Lecture 6 Format Strings 00:01:10 Duration
Lecture 7 Format String Buffer Overflow Demo 00:01:48 Duration
Lecture 8 Integer Overflow Demo 00:01:15 Duration
Lecture 9 Vulnerability to Buffer Overflows 00:03:34 Duration
Lecture 10 Buffer Overflow Demo 00:01:26 Duration
Lecture 11 About Proctor Testing
Lecture 12 Identifying Buffer Overflows 00:01:47 Duration
Lecture 13 Defense Against Buffer Overflows 00:02:27 Duration
Lecture 14 Programming Countermeasures 00:02:45 Duration
Lecture 15 Buffer Overflow Security Tools 00:02:29 Duration
Lecture 16 Buffer Overflow Pentesting 00:01:12 Duration
Lecture 17 Conclusion 00:00:42 Duration

Section 34 : Cryptography

Lecture 1 Introduction 00:00:31 Duration
Lecture 2 Public key Infrastructure (PKI) 00:02:29 Duration
Lecture 3 PKI Installation Demo 00:11:33 Duration
Lecture 4 Certificate Authority (CA) 00:00:48 Duration
Lecture 5 Confi-complete Demo 00:07:54 Duration
Lecture 6 CRL Demo 00:04:09 Duration
Lecture 7 Enroll Certificate Demo 00:02:53 Duration
Lecture 8 Secure Communication with Certificates 00:03:00 Duration
Lecture 9 Certificate Management 00:01:59 Duration
Lecture 10 CA Management Demo 00:06:22 Duration
Lecture 11 Conclusion 00:00:35 Duration

Section 35 : Cryptography Weaknesses

Lecture 1 Introduction 00:02:31 Duration
Lecture 2 BitLocker Demo 00:04:16 Duration
Lecture 3 Cryptographic Schemes 00:00:48 Duration
Lecture 4 Introduction 00:01:02 Duration
Lecture 5 Symmetric Demo 00:02:42 Duration
Lecture 6 Stream and Block Ciphers 00:03:42 Duration
Lecture 7 AES 00:09:39 Duration
Lecture 8 Introduction 00:01:58 Duration
Lecture 9 Asymmetric Demo 00:03:13 Duration
Lecture 10 Key Exchange Methods 00:03:39 Duration
Lecture 11 Hashing 00:01:01 Duration
Lecture 12 Hashcalc Demo 00:01:37 Duration
Lecture 13 Hash Algorithms 00:03:51 Duration
Lecture 14 Encryption Usage Examples 00:01:28 Duration
Lecture 15 Signature Demo 00:04:09 Duration
Lecture 16 Internet Security 00:02:53 Duration
Lecture 17 Conclusion 00:00:38 Duration

Section 36 : Cloud Computing Concepts

Lecture 1 Introduction to Cloud Computing 00:08:45 Duration
Lecture 2 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM

Section 37 : Cloud Computing Attacks

Lecture 1 Types of Attacks 00:08:26 Duration
Lecture 2 Cloud Computing Security 00:02:41 Duration