Cyber Security Certification Course
at just
$69
Enroll Now
Sign Up
Sign In
Cyber Security Certification Course
Cyber Security Certification Course
Section 1 : Introduction
Lecture 1
About Proctor Testing
Pdf
Lecture 2
Introduction to the Instructor!
1:27
Lecture 3
INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Pdf
Lecture 4
Target Audience
1:54
Lecture 5
Study Recommendations
4:20
Lecture 6
Course updates
0:40
Lecture 7
Cyber Security and Ethical Hacking Careers
2:17
Section 2 : Goals and Learning Objectives - Volume 4
Lecture 8
What is End Point Protection and why is it important
4:38
Lecture 9
Goals and Learning Objectives - Volume 4
3:27
Section 3 : File and Disk Encryption
Lecture 10
Goals and Learning Objectives
Preview
Lecture 11
Disk Encryption – What is it good for
7:48
Lecture 12
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
5:29
Lecture 13
Disk Encryption Attacks - Physical
11:18
Lecture 14
Disk Encryption Attacks - Containers, Volumes and Partitions
2:22
Lecture 15
Windows - Disk Encryption - An Introduction
2:40
Lecture 16
Windows - Disk Encryption - Bitlocker
12:7
Lecture 17
Windows - Setting Up BitLocker
9:30
Lecture 18
Windows - Disk Encryption - VeraCrypt
Preview
Lecture 19
Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
3:6
Lecture 20
Windows, Mac & Linux - Setting up VeraCrypt
11:43
Lecture 21
Mac - Filevault2
5:39
Lecture 22
Mac - Setting up Filevault2
7:36
Lecture 23
Linux Whole Disk Encryption - Dm-crypt and LUKS
5:55
Lecture 24
Linux - Setting up DMCryptLUKS
5:10
Lecture 25
Linux - Encrypting the boot partition with Grub2
4:47
Lecture 26
Self Encrypting Drives (SEDs)
1:47
Lecture 27
Defense Against Disk Decryption Attacks
7:48
Lecture 28
File Encryption
4:13
Lecture 29
Mandatory Key Disclosure & Plausible Deniability
7:35
Lecture 30
Nesting Crypto Systems & Obfuscation
3:21
Lecture 31
Case Studies in Disk Decryption
2:46
Section 4 : Anti-Virus and End-Point-Protection
Lecture 32
Goals and Learning Objectives
0:38
Lecture 33
Is Anti-Virus dead - The Threat Landscape
3:55
Lecture 34
Is Anti-Virus dead - Protection Methods
10:53
Lecture 35
Ransomware
4:17
Lecture 36
Anti-Virus and End-Point-Protection Testing
5:40
Lecture 37
The Problem With AV and EPP Testing
3:38
Lecture 38
The Best of Business End-Point-Protection (EPP)
4:5
Lecture 39
Windows - The Best of Anti-Virus and End-Point-Protection
4:5
Lecture 40
Business End Point Protection (EPP)
2:24
Lecture 41
Mac - XProtect
2:51
Lecture 42
Mac - The Best of Anti-Virus and End-Point-Protection
2:35
Lecture 43
Linux - The Best of Anti-Virus and End-Point-Protection
2:41
Lecture 44
Online and Second Opinion - Anti-Virus and End-Point-Protection
3:12
Lecture 45
Is Anti-Virus and End-Point-Protection Dangerous
6:35
Section 5 : Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
Lecture 46
Goals and Learning Objectives
0:34
Lecture 47
Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
5:0
Lecture 48
End Point Detection and Response (EDR)
6:39
Lecture 49
End-Point-Protection How it works together in layers
6:57
Section 6 : End-Point-Protection Technology
Lecture 50
Goals and Learning Objectives
0:40
Lecture 51
What is application and execution control
9:49
Lecture 52
Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
5:42
Lecture 53
Windows - Application control - User Account Control (UAC)
4:18
Lecture 54
Windows - Application control - Software Restriction Policies
4:34
Lecture 55
Windows - Application control - AppLocker
10:24
Lecture 56
Windows - Application Control - Parental controls
Preview
Lecture 57
Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
6:35
Lecture 58
Windows - Exploitation Prevention - EMET
12:59
Lecture 59
Windows - Exploitation Prevention - Traps, MBEA and HMPA
4:49
Lecture 60
Windows 10 - Device Guard
11:33
Lecture 61
Windows - Defender Application Guard for Microsoft Edge
2:22
Lecture 62
Linux - Access Control Models
7:45
Lecture 63
Linux - Security frameworks - AppArmor
2:14
Lecture 64
Linux - Security frameworks - SElinux
3:19
Lecture 65
Linux - Security frameworks - Grsecurity
3:59
Lecture 66
Linux - Security frameworks - PaX and more
1:40
Lecture 67
Linux & Mac - File permissions, POSIX and ACLs
8:3
Lecture 68
Mac - Application control - Parental controls
3:4
Lecture 69
Mac - Application control - Gatekeeper
Preview
Lecture 70
Mac - Application control - System Integrity Protection
5:42
Lecture 71
Mac - Application control - Santa
3:48
Lecture 72
Mac - Application control - Xfence (Previously Little Flocker)
7:18
Lecture 73
Mac - Other Stuff!
1:19
Lecture 74
The New Normal For End-Point-Protection Technology
7:50
Lecture 75
Cylance
4:46
Section 7 : Threat Detection and Monitoring
Lecture 76
Goals and Learning Objectives
0:48
Lecture 77
A Complete Failure to Detect Threats
5:21
Lecture 78
Rethinking Honeypots
4:37
Lecture 79
CanaryTokens
18:46
Lecture 80
OpenCanary
12:20
Lecture 81
Artillery - Binary Defense
3:32
Lecture 82
Honey Drive
1:13
Lecture 83
Intrusion Detection Systems (IDS) Part 1 - Methods
7:11
Lecture 84
Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
4:55
Lecture 85
Host-Based Intrusion Detection - OSSEC
4:40
Lecture 86
Network Analysis - Sguil, Xplico & NetworkMiner
3:5
Lecture 87
File Integrity Monitoring (FIM) and Checking Part 1
2:58
Lecture 88
File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
2:31
Lecture 89
Network Security Toolkit (NST)
2:4
Lecture 90
Security Onion
1:17
Lecture 91
Security Information and Event Management Software (SIEM)
2:51
Section 8 : Malware and Hacker Hunting on the End-Point
Lecture 92
Goals and Learning Objectives
0:49
Lecture 93
Introduction to Malware and Hacker Hunting
8:21
Lecture 94
Windows - Farbar Recovery Scanner
9:20
Lecture 95
Automated Malware Removal Tools
10:41
Lecture 96
Live Rescue Operating Systems, CDs, and USBs
6:42
Lecture 97
Windows - Malware Seek & Destroy - Process Explorer - Part 1
11:33
Lecture 98
Windows - Malware Seek & Destroy - Process Explorer - Part 2
10:4
Lecture 99
Windows - Malware Seek & Destroy - Process Tools
2:9
Lecture 100
Windows - Malware Seek & Destroy - Sigcheck
2:31
Lecture 101
Windows - Malware Seek & Destroy - Autoruns
10:9
Lecture 102
Windows - Malware Seek & Destroy - Process Monitor
10:48
Lecture 103
Windows - Malware Seek & Destroy - Network Connections
8:11
Lecture 104
Malware Seek & Destroy - Networkx
Preview
Lecture 105
Linux - Malware Seek & Destroy - Sysdig
10:27
Lecture 106
Linux - Seek & Destroy Malware and Hackers - Csysdig
11:13
Lecture 107
Linux - Seek & Destroy Malware and Hackers - debsums & unhide
1:53
Lecture 108
Linux & Mac OS X - Malware Seek & Destroy - netstat
7:14
Lecture 109
Linux & Mac OS X - Malware Seek & Destroy - lsof
8:15
Lecture 110
Linux - Malware Seek & Destroy - rkhunter
6:13
Lecture 111
Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
2:0
Lecture 112
Linux - Malware Seek & Destroy - Linux - Persistence Part 1
3:23
Lecture 113
Linux - Malware Seek & Destroy - Linux - Persistence Part 2
10:18
Lecture 114
Linux - Malware Seek & Destroy - Linux - Persistence Part 3
2:56
Lecture 115
Mac - Malware Seek & Destroy - Task Explorer
5:22
Lecture 116
Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
7:26
Lecture 117
Mac, Linux & Windows - OSquery
14:48
Lecture 118
Firmware Rootkits – Seek and Destroy Part 1
7:28
Lecture 119
Firmware Rootkits – Seek and Destroy Part 2
4:5
Lecture 120
End-Point-Protection Recovery and Remediation Technology
3:17
Lecture 121
Encrypted Backup and Cloud Storage
6:4
Section 9 : Operating System and Application Hardening
Lecture 122
Goals and Learning Objectives
0:48
Lecture 123
An Introduction to Hardening
5:28
Lecture 124
Hardening Standards
10:1
Lecture 125
OpenSCAP
12:46
Lecture 126
Baseline Auditing
3:32
Lecture 127
Windows - Hardening
1:54
Lecture 128
Windows - Security Compliance Manager (SCM)
11:2
Lecture 129
Mac – Hardening
1:36
Lecture 130
Linux – Hardening
3:31
Lecture 131
Security Focused Operating Systems
4:50
Lecture 132
Monitoring for Security Drift
1:16
Section 10 : Secure Deleting, Evidence Elimination and Anti-Forensics
Lecture 133
Goals and Learning Objectives
0:43
Lecture 134
Secure File Deletion - Mechanical drives
8:11
Lecture 135
Secure File Deletion - Solid Sate Drives
6:37
Lecture 136
Evidence Elimination & Anti-Forensics - An Introduction
4:42
Lecture 137
Evidence Elimination - CCleaner and Bleachit
7:3
Lecture 138
Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
5:50
Lecture 139
Disk Wiping - Mechanical Drives
5:46
Lecture 140
Disk Wiping - Solid State Drives (SSD)
10:54
Lecture 141
Scrubbing EXIF & Metadata Part 1 - Introduction
6:56
Lecture 142
Scrubbing EXIF & Metadata Part 2 - Tools
5:14
Lecture 143
Scrubbing EXIF & Metadata Part 3 - Guidance
4:37
Lecture 144
Sensor Noise Camera Identification
4:6
Section 11 : Email Security, Privacy and Anonymity
Lecture 145
Goals and Learning Objectives
1:5
Lecture 146
Clients, Protocols and Authentication
13:17
Lecture 147
Email Weaknesses
13:2
Lecture 148
PGP, GPG & Privacy
5:50
Lecture 149
PGP & GPG Clients
6:28
Lecture 150
Windows - PGP & GPG
19:53
Lecture 151
Tail - PGP & GPG
4:1
Lecture 152
PGP & GPG Weaknesses
6:15
Lecture 153
Improving OpenPGP Security - Best Practices - Part 1
2:32
Lecture 154
Improving OpenPGP Security - Primary and Subkeys - Part 2
12:21
Lecture 155
Improving OpenPGP Security - SmartcardsYubikey - Part 3
7:42
Lecture 156
Email Tracking & Exploits
10:33
Lecture 157
Email Anonymity & Pseudonymity
6:18
Lecture 158
TorBirdy
7:36
Lecture 159
Remailers
7:34
Lecture 160
Choosing an Email Provider
13:47
Lecture 161
Email Alternatives
3:17
Section 12 : Messengers - Security, Privacy and Anonymity
Lecture 162
Goals and Learning Objectives
0:20
Lecture 163
An Introduction to Instant Messengers
3:9
Lecture 164
Instant Messenger - Signal
2:31
Lecture 165
Instant Messengers - Chatsecure
1:39
Lecture 166
Instant Messengers - Cryptocat
0:45
Lecture 167
Instant Messengers - Ricochet
0:46
Lecture 168
Instant Messengers - Other
0:38
Lecture 169
Video and Voice Messengers - Linphone
4:29
Lecture 170
Video and Voice Messengers - Jitsi
1:40
Lecture 171
Video and Voice Messengers - Other
0:57
Section 13 : Wrap Up
Lecture 172
About Proctor Testing
Pdf
Lecture 173
Remove - INTRODUCTION TO BRAINMEASURES PROCTOR SYSTEM
Pdf
Lecture 174
Qubes OS
19:8
Lecture 175
Effective Network Isolation
12:28
Lecture 176
Socks5 proxy tunneling
10:20
$69
Take this course now.
Enroll Now
Lectures
176
Video
16:24:47 Hours
Skill level
intermdiate
level
Languages
English
Includes
Lifetime access
Certificate of Completion
Preview
×