Section 1 : Introduction

Lecture 1 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 2 About Proctor Testing Pdf
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 4 Target Audience 1:54
Lecture 5 Study Recommendations 4:19
Lecture 6 About Proctor Testing Pdf
Lecture 7 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf

Section 2 : Goals and Learning Objectives - Volume 2

Lecture 8 Goals and Learning Objectives - Volume 2 3:9

Section 3 : Routers - Port and Vulnerability scanning

Lecture 9 Goals and Learning Objectives 0:28
Lecture 10 The Home Router 13:44
Lecture 11 External Vulnerability Scanning - Shodan, Qualys & Nmap 16:23
Lecture 12 Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS 19:33
Lecture 13 Open Source Custom Router Firmware 11:37

Section 4 : Firewalls

Lecture 14 Goals and Learning Objectives 0:25
Lecture 15 Firewalls – Host-based, network-based and virtual Part 1 14:49
Lecture 16 Firewalls – Host-based, network-based and virtual Part 2 4:54
Lecture 17 Windows - Host Based Firewalls - Windows Firewall 10:29
Lecture 18 Windows - Host Based Firewalls - Windows Firewall Control (WFC) 5:18
Lecture 19 Windows - Host Based Firewalls - Third Party 8:45
Lecture 20 Linux - Host Based Firewalls - iptables 19:59
Lecture 21 Linux - Host Based Firewalls - UFW, gufw & nftables 12:8
Lecture 22 Mac - Host based Firewalls - Application Firewall & PF 13:52
Lecture 23 Mac - Host based Firewalls - pflist, Icefloor & Murus 7:48
Lecture 24 Mac - Host based Firewalls - Little Snitch 6:22
Lecture 25 Network based firewalls - Routers - DD-WRT 5:9
Lecture 26 Network based firewalls - Hardware
Lecture 27 Network based firewalls - pfSense, Smoothwall and Vyos 10:34

Section 5 : Network Attacks, Architecture and Isolation

Lecture 28 Goals and Learning Objectives 0:18
Lecture 29 Network Attacks and Network Isolation - Introduction and IOT 6:35
Lecture 30 Network Attacks and Network Isolation - Arp Spoofing and Switches 6:20
Lecture 31 Effective Network Isolation Part 1 12:28
Lecture 32 Effective Network Isolation Part 2 7:27

Section 6 : Wireless and Wi-Fi Security

Lecture 33 Goals and Learning Objectives 0:25
Lecture 34 Wi-Fi Weaknesses - WEP 2:28
Lecture 35 Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP 13:41
Lecture 36 Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP 6:50
Lecture 37 Wi-Fi Security Testing 4:1
Lecture 38 Wireless Security - Secure Configuration and Network Isolation 14:18
Lecture 39 Wireless security - RF Isolation and Reduction 3:1
Lecture 40 Wireless security - Who is on my Wi-Fi Network 3:20

Section 7 : Network Monitoring for Threats

Lecture 41 Goals and Learning Objectives 0:17
Lecture 42 Syslog 17:0
Lecture 43 Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1 14:1
Lecture 44 Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2 7:59
Lecture 45 Wireshark - Finding malware and hackers - Part 1 15:46
Lecture 46 Wireshark - Finding malware and hackers - Part 2 8:12
Lecture 47 Network Monitoring - Wincap, NST, Netminer and NetWorx 1:39

Section 8 : How We Are Tracked Online

Lecture 48 Goals and Learning Objectives 0:23
Lecture 49 Types of Tracking 4:25
Lecture 50 IP Address 5:27
Lecture 51 3rd Party Connections 4:25
Lecture 52 HTTP Referer 3:21
Lecture 53 Cookies and Scripts 8:0
Lecture 54 Super Cookies 5:13
Lecture 55 Browser Fingerprinting and Browser Volunteered Information 2:37
Lecture 56 Browser and Browser Functionality 1:40
Lecture 57 More Tracking 2:48
Lecture 58 Browser and Internet Profiling 6:35

Section 9 : Search Engines and Privacy

Lecture 59 Goals and Learning Objectives 0:20
Lecture 60 Search Engine Tracking, Censorship and Privacy 12:44
Lecture 61 Ixquick and Startpage 7:56
Lecture 62 DuckDuckGo 3:44
Lecture 63 Disconnect search 4:44
Lecture 64 YaCy 3:32
Lecture 65 Private and Anonymous Searching 7:35

Section 10 : Browser Security and Tracking Prevention

Lecture 66 Goals and Learning Objectives 0:21
Lecture 67 Which Browser – Choice of Browser 6:1
Lecture 68 Reducing the Browser Attack Surface 11:35
Lecture 69 Browser Hacking Demo
Lecture 70 Browser Isolation and Compartmentalization 6:10
Lecture 71 Firefox Security, Privacy and Tracking
Lecture 72 uBlock origin - HTTP Filters, ad and track blockers 14:13
Lecture 73 uMatrix - HTTP Filters, ad and track blockers 7:14
Lecture 74 Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers 6:38
Lecture 75 ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers 6:46
Lecture 76 No-script - HTTP Filters, ad and track blockers 8:29
Lecture 77 Policeman and others - HTTP Filters, ad and track blockers 3:56
Lecture 78 History, Cookies and Super cookies Part 1 11:43
Lecture 79 History, Cookies and Super cookies Part 2 12:13
Lecture 80 HTTP Referer 2:19
Lecture 81 Browser Fingerprinting 18:26
Lecture 82 Certificates and Encryption 11:29
Lecture 83 Firefox Hardening 18:50

Section 11 : Passwords and Authentication Methods

Lecture 84 Goals and Learning Objectives 0:31
Lecture 85 Password Attacks 3:22
Lecture 86 How Passwords are Cracked - Hashes - Part 1 16:17
Lecture 87 How Passwords are Cracked - Hashcat - Part 2 7:9
Lecture 88 Operating System Passwords 2:28
Lecture 89 Password Managers - An Introduction 2:7
Lecture 90 Password Managers - Master Password 5:13
Lecture 91 Password Managers - KeePass, KeePassX and KeyPassXC
Lecture 92 Password Managers - LastPass
Lecture 93 Password Managers - Hardening Lastpass 7:35
Lecture 94 Creating a Strong Password That You Can Remember - Part 1 8:53
Lecture 95 Creating a Strong Password That You Can Remember - Part 2 9:23
Lecture 96 Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy 10:54
Lecture 97 Multi-Factor Authentication - Hard Tokens - 2FA Dongles 5:54
Lecture 98 Choosing a Method of Multi-Factor Authentication 2:50
Lecture 99 Multi-Factor Authentication - Strengths and Weaknesses 2:10
Lecture 100 The Future of Password and Authentication 1:23

Section 12 : Wrap Up

Lecture 101 About Proctor Testing Pdf
Lecture 102 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 103 Which VPN protocol is best to use and why 11:44
Lecture 104 Email Tracking and Hacking 10:33
Lecture 105 Security Vulnerabilities, Threats and Adversaries 4:37