Section 1 : Introduction

Lecture 1 About Proctor Testing Pdf
Lecture 2 Introduction to the Instructor! 1:27
Lecture 3 INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 4 Target Audience 1:54
Lecture 5 Study Recommendations 4:20
Lecture 6 Course updates 0:40
Lecture 7 Cyber Security and Ethical Hacking Careers 2:17

Section 2 : Goals and Learning Objectives - Volume 4

Lecture 8 What is End Point Protection and why is it important 4:38
Lecture 9 Goals and Learning Objectives - Volume 4 3:27

Section 3 : File and Disk Encryption

Lecture 10 Goals and Learning Objectives
Lecture 11 Disk Encryption – What is it good for 7:48
Lecture 12 Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation 5:29
Lecture 13 Disk Encryption Attacks - Physical 11:18
Lecture 14 Disk Encryption Attacks - Containers, Volumes and Partitions 2:22
Lecture 15 Windows - Disk Encryption - An Introduction 2:40
Lecture 16 Windows - Disk Encryption - Bitlocker 12:7
Lecture 17 Windows - Setting Up BitLocker 9:30
Lecture 18 Windows - Disk Encryption - VeraCrypt
Lecture 19 Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt 3:6
Lecture 20 Windows, Mac & Linux - Setting up VeraCrypt 11:43
Lecture 21 Mac - Filevault2 5:39
Lecture 22 Mac - Setting up Filevault2 7:36
Lecture 23 Linux Whole Disk Encryption - Dm-crypt and LUKS 5:55
Lecture 24 Linux - Setting up DMCryptLUKS 5:10
Lecture 25 Linux - Encrypting the boot partition with Grub2 4:47
Lecture 26 Self Encrypting Drives (SEDs) 1:47
Lecture 27 Defense Against Disk Decryption Attacks 7:48
Lecture 28 File Encryption 4:13
Lecture 29 Mandatory Key Disclosure & Plausible Deniability 7:35
Lecture 30 Nesting Crypto Systems & Obfuscation 3:21
Lecture 31 Case Studies in Disk Decryption 2:46

Section 4 : Anti-Virus and End-Point-Protection

Lecture 32 Goals and Learning Objectives 0:38
Lecture 33 Is Anti-Virus dead - The Threat Landscape 3:55
Lecture 34 Is Anti-Virus dead - Protection Methods 10:53
Lecture 35 Ransomware 4:17
Lecture 36 Anti-Virus and End-Point-Protection Testing 5:40
Lecture 37 The Problem With AV and EPP Testing 3:38
Lecture 38 The Best of Business End-Point-Protection (EPP) 4:5
Lecture 39 Windows - The Best of Anti-Virus and End-Point-Protection 4:5
Lecture 40 Business End Point Protection (EPP) 2:24
Lecture 41 Mac - XProtect 2:51
Lecture 42 Mac - The Best of Anti-Virus and End-Point-Protection 2:35
Lecture 43 Linux - The Best of Anti-Virus and End-Point-Protection 2:41
Lecture 44 Online and Second Opinion - Anti-Virus and End-Point-Protection 3:12
Lecture 45 Is Anti-Virus and End-Point-Protection Dangerous 6:35

Section 5 : Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)

Lecture 46 Goals and Learning Objectives 0:34
Lecture 47 Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) 5:0
Lecture 48 End Point Detection and Response (EDR) 6:39
Lecture 49 End-Point-Protection How it works together in layers 6:57

Section 6 : End-Point-Protection Technology

Lecture 50 Goals and Learning Objectives 0:40
Lecture 51 What is application and execution control 9:49
Lecture 52 Windows - Application control - ACLs, Windows Permission Identifier & Accessenum 5:42
Lecture 53 Windows - Application control - User Account Control (UAC) 4:18
Lecture 54 Windows - Application control - Software Restriction Policies 4:34
Lecture 55 Windows - Application control - AppLocker 10:24
Lecture 56 Windows - Application Control - Parental controls
Lecture 57 Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks 6:35
Lecture 58 Windows - Exploitation Prevention - EMET 12:59
Lecture 59 Windows - Exploitation Prevention - Traps, MBEA and HMPA 4:49
Lecture 60 Windows 10 - Device Guard 11:33
Lecture 61 Windows - Defender Application Guard for Microsoft Edge 2:22
Lecture 62 Linux - Access Control Models 7:45
Lecture 63 Linux - Security frameworks - AppArmor 2:14
Lecture 64 Linux - Security frameworks - SElinux 3:19
Lecture 65 Linux - Security frameworks - Grsecurity 3:59
Lecture 66 Linux - Security frameworks - PaX and more 1:40
Lecture 67 Linux & Mac - File permissions, POSIX and ACLs 8:3
Lecture 68 Mac - Application control - Parental controls 3:4
Lecture 69 Mac - Application control - Gatekeeper
Lecture 70 Mac - Application control - System Integrity Protection 5:42
Lecture 71 Mac - Application control - Santa 3:48
Lecture 72 Mac - Application control - Xfence (Previously Little Flocker) 7:18
Lecture 73 Mac - Other Stuff! 1:19
Lecture 74 The New Normal For End-Point-Protection Technology 7:50
Lecture 75 Cylance 4:46

Section 7 : Threat Detection and Monitoring

Lecture 76 Goals and Learning Objectives 0:48
Lecture 77 A Complete Failure to Detect Threats 5:21
Lecture 78 Rethinking Honeypots 4:37
Lecture 79 CanaryTokens 18:46
Lecture 80 OpenCanary 12:20
Lecture 81 Artillery - Binary Defense 3:32
Lecture 82 Honey Drive 1:13
Lecture 83 Intrusion Detection Systems (IDS) Part 1 - Methods 7:11
Lecture 84 Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n 4:55
Lecture 85 Host-Based Intrusion Detection - OSSEC 4:40
Lecture 86 Network Analysis - Sguil, Xplico & NetworkMiner 3:5
Lecture 87 File Integrity Monitoring (FIM) and Checking Part 1 2:58
Lecture 88 File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe 2:31
Lecture 89 Network Security Toolkit (NST) 2:4
Lecture 90 Security Onion 1:17
Lecture 91 Security Information and Event Management Software (SIEM) 2:51

Section 8 : Malware and Hacker Hunting on the End-Point

Lecture 92 Goals and Learning Objectives 0:49
Lecture 93 Introduction to Malware and Hacker Hunting 8:21
Lecture 94 Windows - Farbar Recovery Scanner 9:20
Lecture 95 Automated Malware Removal Tools 10:41
Lecture 96 Live Rescue Operating Systems, CDs, and USBs 6:42
Lecture 97 Windows - Malware Seek & Destroy - Process Explorer - Part 1 11:33
Lecture 98 Windows - Malware Seek & Destroy - Process Explorer - Part 2 10:4
Lecture 99 Windows - Malware Seek & Destroy - Process Tools 2:9
Lecture 100 Windows - Malware Seek & Destroy - Sigcheck 2:31
Lecture 101 Windows - Malware Seek & Destroy - Autoruns 10:9
Lecture 102 Windows - Malware Seek & Destroy - Process Monitor 10:48
Lecture 103 Windows - Malware Seek & Destroy - Network Connections 8:11
Lecture 104 Malware Seek & Destroy - Networkx
Lecture 105 Linux - Malware Seek & Destroy - Sysdig 10:27
Lecture 106 Linux - Seek & Destroy Malware and Hackers - Csysdig 11:13
Lecture 107 Linux - Seek & Destroy Malware and Hackers - debsums & unhide 1:53
Lecture 108 Linux & Mac OS X - Malware Seek & Destroy - netstat 7:14
Lecture 109 Linux & Mac OS X - Malware Seek & Destroy - lsof 8:15
Lecture 110 Linux - Malware Seek & Destroy - rkhunter 6:13
Lecture 111 Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD 2:0
Lecture 112 Linux - Malware Seek & Destroy - Linux - Persistence Part 1 3:23
Lecture 113 Linux - Malware Seek & Destroy - Linux - Persistence Part 2 10:18
Lecture 114 Linux - Malware Seek & Destroy - Linux - Persistence Part 3 2:56
Lecture 115 Mac - Malware Seek & Destroy - Task Explorer 5:22
Lecture 116 Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer 7:26
Lecture 117 Mac, Linux & Windows - OSquery 14:48
Lecture 118 Firmware Rootkits – Seek and Destroy Part 1 7:28
Lecture 119 Firmware Rootkits – Seek and Destroy Part 2 4:5
Lecture 120 End-Point-Protection Recovery and Remediation Technology 3:17
Lecture 121 Encrypted Backup and Cloud Storage 6:4

Section 9 : Operating System and Application Hardening

Lecture 122 Goals and Learning Objectives 0:48
Lecture 123 An Introduction to Hardening 5:28
Lecture 124 Hardening Standards 10:1
Lecture 125 OpenSCAP 12:46
Lecture 126 Baseline Auditing 3:32
Lecture 127 Windows - Hardening 1:54
Lecture 128 Windows - Security Compliance Manager (SCM) 11:2
Lecture 129 Mac – Hardening 1:36
Lecture 130 Linux – Hardening 3:31
Lecture 131 Security Focused Operating Systems 4:50
Lecture 132 Monitoring for Security Drift 1:16

Section 10 : Secure Deleting, Evidence Elimination and Anti-Forensics

Lecture 133 Goals and Learning Objectives 0:43
Lecture 134 Secure File Deletion - Mechanical drives 8:11
Lecture 135 Secure File Deletion - Solid Sate Drives 6:37
Lecture 136 Evidence Elimination & Anti-Forensics - An Introduction 4:42
Lecture 137 Evidence Elimination - CCleaner and Bleachit 7:3
Lecture 138 Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer 5:50
Lecture 139 Disk Wiping - Mechanical Drives 5:46
Lecture 140 Disk Wiping - Solid State Drives (SSD) 10:54
Lecture 141 Scrubbing EXIF & Metadata Part 1 - Introduction 6:56
Lecture 142 Scrubbing EXIF & Metadata Part 2 - Tools 5:14
Lecture 143 Scrubbing EXIF & Metadata Part 3 - Guidance 4:37
Lecture 144 Sensor Noise Camera Identification 4:6

Section 11 : Email Security, Privacy and Anonymity

Lecture 145 Goals and Learning Objectives 1:5
Lecture 146 Clients, Protocols and Authentication 13:17
Lecture 147 Email Weaknesses 13:2
Lecture 148 PGP, GPG & Privacy 5:50
Lecture 149 PGP & GPG Clients 6:28
Lecture 150 Windows - PGP & GPG 19:53
Lecture 151 Tail - PGP & GPG 4:1
Lecture 152 PGP & GPG Weaknesses 6:15
Lecture 153 Improving OpenPGP Security - Best Practices - Part 1 2:32
Lecture 154 Improving OpenPGP Security - Primary and Subkeys - Part 2 12:21
Lecture 155 Improving OpenPGP Security - SmartcardsYubikey - Part 3 7:42
Lecture 156 Email Tracking & Exploits 10:33
Lecture 157 Email Anonymity & Pseudonymity 6:18
Lecture 158 TorBirdy 7:36
Lecture 159 Remailers 7:34
Lecture 160 Choosing an Email Provider 13:47
Lecture 161 Email Alternatives 3:17

Section 12 : Messengers - Security, Privacy and Anonymity

Lecture 162 Goals and Learning Objectives 0:20
Lecture 163 An Introduction to Instant Messengers 3:9
Lecture 164 Instant Messenger - Signal 2:31
Lecture 165 Instant Messengers - Chatsecure 1:39
Lecture 166 Instant Messengers - Cryptocat 0:45
Lecture 167 Instant Messengers - Ricochet 0:46
Lecture 168 Instant Messengers - Other 0:38
Lecture 169 Video and Voice Messengers - Linphone 4:29
Lecture 170 Video and Voice Messengers - Jitsi 1:40
Lecture 171 Video and Voice Messengers - Other 0:57

Section 13 : Wrap Up

Lecture 172 About Proctor Testing Pdf
Lecture 173 Remove - INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM Pdf
Lecture 174 Qubes OS 19:8
Lecture 175 Effective Network Isolation 12:28
Lecture 176 Socks5 proxy tunneling 10:20