Section 1 : Chapter 1

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 2 : Introduction to Ethical Hacking

Lecture 2 Introduction to Ethical Hacking 10:0
Lecture 3 Vulnerabilities 6:58
Lecture 4 Defense-in-depth 3:25
Lecture 5 Penetration Testing 7:28
Lecture 6 Pentesting Demo 1 5:17
Lecture 7 Pentesting Demo 2 2:20
Lecture 8 Pentesting Demo 3 3:11
Lecture 9 Pentesting Demo 4 4:56
Lecture 10 Methodology for Penetration TestingEthical Hacking 2:38
Lecture 11 Vulnerability Management 1:15
Lecture 12 Incident Management 2:41
Lecture 13 Security Policy 1:52
Lecture 14 Conclusion 0:56

Section 3 : Disaster Recovery and Risk Management

Lecture 15 Defining Risk Management 2:15
Lecture 16 Strategies For Managing Risk 2:12
Lecture 17 How to Analyze Risk 5:23
Lecture 18 Risk Assessment Demo 18:16
Lecture 19 DR Strategies 5:3
Lecture 20 Plan Testing and Execution 2:15
Lecture 21 Conclusion 1:0

Section 4 : Penetration Testing

Lecture 22 Security Auditing 5:49
Lecture 23 Penetration Testing Types 4:32
Lecture 24 Vulnerability Assessment Demo 10:36
Lecture 25 Areas of Pentest 4:45
Lecture 26 Awareness and Compliance 1:37
Lecture 27 Educating Employees 1:26
Lecture 28 Conclusion 1:5

Section 5 : Vulnerability Assessment

Lecture 29 Introduction 2:34
Lecture 30 Testing Overview 0:51
Lecture 31 Security Alerts 4:9
Lecture 32 Scanners 4:21
Lecture 33 Nessus Demo
Lecture 34 IBM AppScan Demo 2:54
Lecture 35 GFI Languard Demo 1:34
Lecture 36 Analyzing the Scan Results 4:32
Lecture 37 Generating Reports 1:55
Lecture 38 Remediation 7:47
Lecture 39 Patch Management 1:28
Lecture 40 Conclusion 1:4

Section 6 : Physical Security

Lecture 41 Introduction 0:46
Lecture 42 Importance of Physical Security 3:34
Lecture 43 Physical Security Planning 4:49
Lecture 44 CPTED 6:52
Lecture 45 Protecting Assets 1:45
Lecture 46 Introduction 2:38
Lecture 47 Power Supply and Protection 6:43
Lecture 48 Environment Control 2:46
Lecture 49 Fire Prevention, Detection, and Suppression 3:41
Lecture 50 Perimeter Security 3:28
Lecture 51 External Boundary Protection 1:38
Lecture 52 Locks and Fencing 1:36
Lecture 53 Lighting and Patrols 2:51
Lecture 54 Surveillance Devices 1:11
Lecture 55 Intrusion Detection Systems 1:50
Lecture 56 Auditing Physical Security 0:52
Lecture 57 Testing and Drills 1:12
Lecture 58 Conclusion 0:39

Section 7 : Footprinting

Lecture 59 Introduction 1:14
Lecture 60 FootprintingReconnaissance 4:34
Lecture 61 Knowledge Check Possible Threats of Footprinting 1:17
Lecture 62 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 63 Knowledge Check Information Gathering Groups 1:58
Lecture 64 Footprinting Hierarchy 1:8
Lecture 65 WHOIS Footprinting Demo 1:53
Lecture 66 Footprinting Methodology 2:42
Lecture 67 Passive vs 4:39
Lecture 68 Knowledge Check WHOIS Databases 1:30
Lecture 69 Knowledge Check DNS Zone Data 2:0
Lecture 70 Social Engineering 8:3
Lecture 71 Footprinting with Google 1:57
Lecture 72 Google Hacking 0:50
Lecture 73 Exploit Database Demo 1:19
Lecture 74 Google Hacking for Charity Demo
Lecture 75 Google Advance Search Operations 1:49
Lecture 76 Google Hacking Tools 3:0
Lecture 77 Footprinting Tools 1:13
Lecture 78 Maltego Demo 1:42
Lecture 79 Additional Footprinting Tools 0:46
Lecture 80 Footprinting Countermeasures 2:18
Lecture 81 Footprinting PenTesting 3:3
Lecture 82 Conclusion 1:55

Section 8 : Reconnaissance

Lecture 83 Introduction 1:51
Lecture 84 Reconnaissance Threats 3:11
Lecture 85 7 Steps of Information Gathering 6:25
Lecture 86 Footprinting Methodology 2:37
Lecture 87 Passive vs 3:7
Lecture 88 Passive Footprinting Tools 0:23
Lecture 89 PassiveRecon Demo 2:1
Lecture 90 Shodanhq 0:41
Lecture 91 Active Footprinting 2:35
Lecture 92 Visualroute Trace Demo 0:46
Lecture 93 Scanning Networks and Ports 5:40
Lecture 94 Nmap Scan Demo 1:41
Lecture 95 Enumeration 1:25
Lecture 96 Reconnaissance Countermeasures 2:15
Lecture 97 Conclusion 1:6

Section 9 : Scanning Networks

Lecture 98 Defining Private and Public Scanning 0:52
Lecture 99 Techniques for Private Network Scanning 2:27
Lecture 100 Angry IP Demo 6:45
Lecture 101 Nmap Demo 4:20
Lecture 102 Hping Demo 3:14
Lecture 103 Public Scanning with Zmap 2:31
Lecture 104 Zmap Demo 4:53
Lecture 105 Conclusion 0:41

Section 10 : Port Scanning

Lecture 106 Introduction to Port Scanning 3:53
Lecture 107 Port Scanning Methods 4:34
Lecture 108 Ping Demo 3:26
Lecture 109 Ping Tester Demo 4:4
Lecture 110 Well-Known Ports 3:16
Lecture 111 Netstat Demo 3:5
Lecture 112 Informational Sites 0:58
Lecture 113 Port Scanning Techniques I 11:13
Lecture 114 Nmap Demo 1:39
Lecture 115 Scans and Firewalls 10:11
Lecture 116 Nmap Version Detection Demo 4:33
Lecture 117 UDP 3:23
Lecture 118 Advanced Scanning Techniques 2:43
Lecture 119 Port Scanning Tools 5:33
Lecture 120 Port Scanning Techniques II 3:58
Lecture 121 Port Scanning Countermeasures 3:18
Lecture 122 Conclusion 1:23

Section 11 : Banner Grabbing

Lecture 123 Introduction 0:50
Lecture 124 What is Banner Grabbing 3:52
Lecture 125 Types of Banner Grabbing 2:35
Lecture 126 Banner Grabbing Tools 3:43
Lecture 127 Banner Grabbing Using Telnet Demo 1:46
Lecture 128 Countermeasures 1:29
Lecture 129 Conclusion 0:50

Section 12 : Enumeration

Lecture 130 Introduction 0:57
Lecture 131 Applications 1:42
Lecture 132 NetBIOS Demo 4:12
Lecture 133 SNMP 2:37
Lecture 134 LDAP 0:42
Lecture 135 LDAP Demo 3:28
Lecture 136 NTP 1:5
Lecture 137 SMTP 1:29
Lecture 138 DNS Enumeration 1:33
Lecture 139 NSlookup Demo 2:24
Lecture 140 Conclusion 0:33

Section 13 : Linux Fundamentals

Lecture 141 Linux History 1:48
Lecture 142 GUI & Shell 4:43
Lecture 143 Linux Shell 1:27
Lecture 144 Managing Files and Directories 1:8
Lecture 145 Root Enable Disable Demo 3:17
Lecture 146 Linux Commands 3:30
Lecture 147 Navigating in Linux 3:12
Lecture 148 Linux Navigation Demo 6:15
Lecture 149 Tar 2:28
Lecture 150 Compression Demo 3:18
Lecture 151 Configuring Subdirectories 3:13
Lecture 152 Vi Demo 4:6
Lecture 153 Conclusion 0:51

Section 14 : Configuring Linux for Pentesting

Lecture 154 Installing Applications 2:5
Lecture 155 apt-get Demo 3:8
Lecture 156 Applications for Pentesting 1:42
Lecture 157 Essential Tools and GUI Demo 7:55
Lecture 158 Iptables 1:0
Lecture 159 Iptables Demo 9:26
Lecture 160 IP Forwarding Demo 3:1
Lecture 161 Conclusion 0:54

Section 15 : Authentication Systems

Lecture 162 Authentication Factors 1:54
Lecture 163 Forms of Authentication 3:52
Lecture 164 Introduction to Authentication Protocols 1:8
Lecture 165 CHAP and MS-CHAP 2:44
Lecture 166 NTLM 5:53
Lecture 167 NTLM Continued 3:30
Lecture 168 Authentication Methods Demo 13:3
Lecture 169 Triple As 1:25
Lecture 170 RADIUS Demo 6:9
Lecture 171 RADIUS 2 Demo
Lecture 172 LDAP 2:58
Lecture 173 Single Sign-on 1:59
Lecture 174 Conclusion 1:35

Section 16 : System Hacking

Lecture 175 Introduction 1:49
Lecture 176 Types of Password Attacks 2:29
Lecture 177 Password Guessing 3:38
Lecture 178 Password Hashing and Encryption 10:35
Lecture 179 Password Cracking Technique
Lecture 180 Privilege Escalation 1:14
Lecture 181 Countermeasures 5:11
Lecture 182 Knowledge Check 0:44
Lecture 183 Hiding Files with NTFS 2:55
Lecture 184 Knowledge Check 0:49
Lecture 185 Steganography and Its Uses 5:37
Lecture 186 Knowledge Check 0:33
Lecture 187 Understanding Rootkits 3:36
Lecture 188 Knowledge Check 0:31
Lecture 189 Conclusion 1:55

Section 17 : Spyware & Keyloggers

Lecture 190 Introduction 7:24
Lecture 191 Spyware Distribution 13:59
Lecture 192 Knowledge Check 0:43
Lecture 193 Understanding Keyloggers 1:33
Lecture 194 Hardware Keyloggers 3:27
Lecture 195 Software Keylogger 2:54
Lecture 196 Keylogger Examples 11:27
Lecture 197 Kernel Keyloggers 1:44
Lecture 198 Protecting Yourself 14:13
Lecture 199 Knowledge Check 0:36
Lecture 200 Conclusion 1:1

Section 18 : Covering Tracks

Lecture 201 Dealing with Windows Logs 6:1
Lecture 202 Working with WinZapper
Lecture 203 MRU-Blaster 1:53
Lecture 204 Using Metasploit to Cover Tracks 1:46
Lecture 205 Meterpreter Event Manager Demo 2:25
Lecture 206 Meterpreter Timestomp Demo 1:54
Lecture 207 Linux History and Events 2:21
Lecture 208 Clearing the Bash History Demo 3:30
Lecture 209 Clearing Linux Events Demo 2:16
Lecture 210 File Shredding 1:35
Lecture 211 Anonymity 3:27
Lecture 212 Using Live CDs, Proxies, and Onion routers 2:32
Lecture 213 Countermeasures 2:58
Lecture 214 Conclusion 0:47

Section 19 : Trojans and Backdoors

Lecture 215 Introduction 1:31
Lecture 216 Definition and Distribution 7:50
Lecture 217 Capabilities 8:25
Lecture 218 Malware Knowledge Check 0:41
Lecture 219 Backdoors 5:45
Lecture 220 Trojans 12:6
Lecture 221 Wrappers 7:21
Lecture 222 Avoiding Detection 3:15
Lecture 223 Tools of the Trade Knowledge Check 0:32
Lecture 224 Countermeasure Considerations 5:44
Lecture 225 Investigation Tools 1:30
Lecture 226 Port Monitorization 1:30
Lecture 227 System File Monitorization 1:21
Lecture 228 Software Restriction Policies 4:34
Lecture 229 Additional Countermeasure Tools 1:28
Lecture 230 Countermeasures Knowledge Check 0:49
Lecture 231 Conclusion 1:58

Section 20 : Viruses and Worms

Lecture 232 Virus Definition and Behavior 2:38
Lecture 233 DELme Demo 4:49
Lecture 234 Viruses 0:51
Lecture 235 Virus Types 9:14
Lecture 236 JPS Demo 3:50
Lecture 237 Stealth Strategies and Infection 4:36
Lecture 238 Virus Mutation Demo 2:55
Lecture 239 Virus Infection 2:5
Lecture 240 Viruses Examples 2:28
Lecture 241 Defining Worms 1:31
Lecture 242 IT Security Fundamentals- CompTIA Security+ 2015 SY0-401- Course Map Pdf
Lecture 243 Known Dangerous Worms 11:17
Lecture 244 Conclusion 0:49

Section 21 : Sniffers

Lecture 245 Packet Sniffers 15:27
Lecture 246 Wireshark Demo 9:30
Lecture 247 Sniffing Passive vs Active 2:31
Lecture 248 Techniques for Poisoning the Network 3:38
Lecture 249 ARP Poisoning Demo 10:33
Lecture 250 Sniffing and Spoofing Tools 10:15
Lecture 251 Countermeasures 1:14
Lecture 252 XARP Demo 3:8
Lecture 253 Cisco Switch Security Configuration 1:43
Lecture 254 Conclusion 1:6

Section 22 : Social Engineering

Lecture 255 Introduction 1:35
Lecture 256 Security Policy 1:24
Lecture 257 Human-based Attacks 2:29
Lecture 258 Piggybacking 3:47
Lecture 259 Computer-based Attacks 1:12
Lecture 260 Phishing Email Demo 4:33
Lecture 261 SET-webTemplate Demo 7:12
Lecture 262 SET-spear phishing Demo 4:37
Lecture 263 SET-trojan Demo 4:17
Lecture 264 SET-SMS Spoofing Demo 2:21
Lecture 265 Using Social Media 0:58
Lecture 266 Conclusion 0:52

Section 23 : Denial of Service

Lecture 267 Introduction 2:29
Lecture 268 2014 DDoS Attacks and Impact Report 4:31
Lecture 269 DoS and Distributed DoS 4:43
Lecture 270 Distributed DoS 3:12
Lecture 271 DoS Impact 1:19
Lecture 272 Distributed DoS Attack Symptoms 0:46
Lecture 273 Digital Attack Map Demo 2:55
Lecture 274 DoS, DDoS Attacks 7:0
Lecture 275 Introduction to Botnets 2:19
Lecture 276 Botnet Ecosystem 8:6
Lecture 277 Botnet Propagation 2:8
Lecture 278 Botnet Tools 2:1
Lecture 279 DDoS Tools 0:42
Lecture 280 HOIC Demo 1:27
Lecture 281 DoS Attack Detection 0:57
Lecture 282 Activity Profiling 0:59
Lecture 283 Sequential Change-Point Detection 0:57
Lecture 284 Wavelet Analysis 0:36
Lecture 285 DoS, DDoS Countermeasures 8:11
Lecture 286 Botnet Countermeasures 1:9
Lecture 287 Advanced DoS, DDoS Protection Tools 3:2
Lecture 288 DDoS in Penetration Testing 1:57
Lecture 289 Advanced DDoS Protection Method 0:42
Lecture 290 Conclusion 2:0

Section 24 : Session Hijacking

Lecture 291 Introduction 5:40
Lecture 292 Contributors to Session Hijacking 2:32
Lecture 293 Impact of Session Hijacking 0:53
Lecture 294 Session Hijacking Strategies 2:24
Lecture 295 Session Hijacking Process 2:57
Lecture 296 Types of Session Hijacking 11:47
Lecture 297 Session Hijacking Tools 0:50
Lecture 298 ZAP Tool Demo 4:52
Lecture 299 Burp Suite Demo 7:39
Lecture 300 TamperIE Demo 7:50
Lecture 301 Protection Against Session Hijacking 2:44
Lecture 302 IP Security Architecture 1:53
Lecture 303 Penetration Testing in Session Hijacking 4:9
Lecture 304 Conclusion 1:37

Section 25 : Hacking Web and App Servers

Lecture 305 Gathering Information 1:29
Lecture 306 Apache2 Demo 9:16
Lecture 307 Netcraft Demo 5:20
Lecture 308 Website Mirroring Demo 3:43
Lecture 309 Web server Attacks 4:7
Lecture 310 W3AF Demo 5:5
Lecture 311 Vulnerabilites 4:48
Lecture 312 WMAP Demo 5:23
Lecture 313 Conclusion 0:46

Section 26 : Advanced Exploitation Techniques

Lecture 314 Introduction to Exploits 4:3
Lecture 315 Metasploit 2:19
Lecture 316 Metasploit Demo 4:0
Lecture 317 Understanding Metasploit 5:50
Lecture 318 Armitage 2:0
Lecture 319 Meterpreter Demo 8:22
Lecture 320 Metasploit 1:53
Lecture 321 Armitage Demo 4:45
Lecture 322 Hands on Metasploit 1:3
Lecture 323 Exploiting Vulnerabilities 1:41
Lecture 324 Payload 1:43
Lecture 325 Armitage-mimkatz Demo 4:27
Lecture 326 Core Impact Pro 2:54
Lecture 327 Conclusion 1:2

Section 27 : SQL Injections

Lecture 328 Introduction to SQL Injections 5:29
Lecture 329 SQL Injection Methodology 5:22
Lecture 330 SQL Injection Attacks 5:16
Lecture 331 SQL Injection Detection 1:12
Lecture 332 Buffer Overflow Exploit 1:2
Lecture 333 BSQL Tool Demo 1:45
Lecture 334 SQL Injection Username and Password Demo 4:4
Lecture 335 Testing for SQL Injection 1:37
Lecture 336 Countermeasures 2:49
Lecture 337 SQL Injection Detection Tools 0:55
Lecture 338 Conclusion 1:14

Section 28 : Wireless Types and Vulnerabilities

Lecture 339 Introduction 0:38
Lecture 340 Wireless Communication Systems 2:12
Lecture 341 Standards 4:40
Lecture 342 InSSIDer Demo 5:49
Lecture 343 Encryption Protocols 8:39
Lecture 344 WPA2 Encryption 2:53
Lecture 345 Systems 7:1
Lecture 346 Jammer Demo 2:25
Lecture 347 Fake AP Demo 2:44
Lecture 348 Attacks 5:4
Lecture 349 Capsa Demo 5:41
Lecture 350 Conclusion 0:39

Section 29 : Hacking Wireless Networks

Lecture 351 Introduction 2:2
Lecture 352 Aircrack Suite 3:59
Lecture 353 WEP Demo 10:15
Lecture 354 WPA2 Demo 5:48
Lecture 355 Using Reaver 1:25
Lecture 356 Using Windows 1:31
Lecture 357 Windows Hacking Demo 4:43
Lecture 358 DOS Demo 3:45
Lecture 359 Conclusion 0:41

Section 30 : Mobile Hacking Basics

Lecture 360 Introduction 1:18
Lecture 361 Rise of Mobility 4:55
Lecture 362 Areas to Consider 2:30
Lecture 363 Device Security 5:23
Lecture 364 Android Security Features Demo 7:29
Lecture 365 Lookout Demo 4:34
Lecture 366 Application Security 1:50
Lecture 367 Geo Tagging Demo 5:44
Lecture 368 Mobile Applications 4:37
Lecture 369 Sophos Demo 5:13
Lecture 370 Trend Micro Security Demo 4:43
Lecture 371 BYOD Concerns 1:52
Lecture 372 iScan Demo 4:1
Lecture 373 Options 4:4
Lecture 374 App Permissions Demo 4:56
Lecture 375 The Virtualization Option 1:52
Lecture 376 Conclusion 1:24

Section 31 : Evading Firewalls and Honeypots

Lecture 377 Introduction 1:14
Lecture 378 Understanding Firewalls 4:1
Lecture 379 Firewall Architectures 2:37
Lecture 380 Types of Firewalls 4:45
Lecture 381 Evading Firewalls 6:31
Lecture 382 Configuring Proxy Demo 1:17
Lecture 383 Evading Firewalls Using Tunneling 2:52
Lecture 384 Evading Firewalls Using External Systems 1:20
Lecture 385 Evading Firewalls Using MitM Attacks 1:17
Lecture 386 Firewall Evasion Tools 2:11
Lecture 387 Firewall Bypassing and Pentration Testing Demo 1:23
Lecture 388 Firewall Evasion Tools Continued 3:27
Lecture 389 Honeypots Defined 0:54
Lecture 390 Types of Honeypots 3:29
Lecture 391 Detecting Honeypots 2:9
Lecture 392 Honeypot Using Atomic Software Demo 1:49
Lecture 393 Countermeasures 1:31
Lecture 394 Penetration Testing 3:30
Lecture 395 Conclusion 1:10

Section 32 : Evading IDS

Lecture 396 Introduction 2:9
Lecture 397 Intrusion Detection Systems 4:21
Lecture 398 Introduction 0:39
Lecture 399 Encryption and Flooding 1:59
Lecture 400 Obfuscating 0:59
Lecture 401 Fragmentation Attack 1:40
Lecture 402 Overlapping Fragments 0:57
Lecture 403 Vulnerabilites 0:55
Lecture 404 How to Avoid IDS Demo 1:43
Lecture 405 Insertion Attack 0:52
Lecture 406 Evasion Attack 0:47
Lecture 407 Denial-of-Service Attack 2:17
Lecture 408 Application-Layer Attacks 0:56
Lecture 409 Time to Live Attacks 1:22
Lecture 410 False Positive Generation 0:36
Lecture 411 Urgency Flag 0:52
Lecture 412 Session Splicing 1:23
Lecture 413 Pre Connection SYN 1:8
Lecture 414 Post Connection SYN 1:50
Lecture 415 Snort 0:43
Lecture 416 More Tools 3:36
Lecture 417 Ways to Detect 2:56
Lecture 418 ADMutate 0:34
Lecture 419 Other Evading Tools 1:41
Lecture 420 Centralized Security Management 3:27
Lecture 421 IDS Penetration Testing 2:29
Lecture 422 Conclusion 0:46

Section 33 : Buffer Overflows

Lecture 423 Introduction to Buffer Overflow 3:14
Lecture 424 Stacks 4:25
Lecture 425 Stack Overflow Demo 1:57
Lecture 426 Heaps 2:6
Lecture 427 Heap Overflow Demo 2:4
Lecture 428 Format Strings 1:10
Lecture 429 Format String Buffer Overflow Demo 1:48
Lecture 430 Integer Overflow Demo 1:15
Lecture 431 Vulnerability to Buffer Overflows 3:34
Lecture 432 Buffer Overflow Demo 1:26
Lecture 433 About Proctor Testing Pdf
Lecture 434 Identifying Buffer Overflows 1:47
Lecture 435 Defense Against Buffer Overflows 2:27
Lecture 436 Programming Countermeasures 2:45
Lecture 437 Buffer Overflow Security Tools 2:29
Lecture 438 Buffer Overflow Pentesting 1:12
Lecture 439 Conclusion 0:42

Section 34 : Cryptography

Lecture 440 Introduction 0:31
Lecture 441 Public key Infrastructure (PKI) 2:29
Lecture 442 PKI Installation Demo 11:33
Lecture 443 Certificate Authority (CA) 0:48
Lecture 444 Confi-complete Demo 7:54
Lecture 445 CRL Demo 4:9
Lecture 446 Enroll Certificate Demo 2:53
Lecture 447 Secure Communication with Certificates 3:0
Lecture 448 Certificate Management 1:59
Lecture 449 CA Management Demo 6:22
Lecture 450 Conclusion 0:35

Section 35 : Cryptography Weaknesses

Lecture 451 Introduction 2:31
Lecture 452 BitLocker Demo 4:16
Lecture 453 Cryptographic Schemes 0:48
Lecture 454 Introduction 1:2
Lecture 455 Symmetric Demo 2:42
Lecture 456 Stream and Block Ciphers 3:42
Lecture 457 AES 9:39
Lecture 458 Introduction 1:58
Lecture 459 Asymmetric Demo 3:13
Lecture 460 Key Exchange Methods 3:39
Lecture 461 Hashing 1:1
Lecture 462 Hashcalc Demo 1:37
Lecture 463 Hash Algorithms 3:51
Lecture 464 Encryption Usage Examples 1:28
Lecture 465 Signature Demo 4:9
Lecture 466 Internet Security 2:53
Lecture 467 Conclusion 0:38

Section 36 : Cloud Computing Concepts

Lecture 468 Introduction to Cloud Computing 8:45
Lecture 469 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 37 : Cloud Computing Attacks

Lecture 470 Types of Attacks 8:26
Lecture 471 Cloud Computing Security 2:41