Infomation Security teaches the basic concepts and principles of information security, and the fundamental approaches to secure computers and networks. Its main topics include: security basics, security management and risk assessment, software security, operating systems security, database security, cryptography algorithms and protocols, network au...
Infomation Security teaches the basic concepts and principles of information security, and the fundamental approaches to secure computers and networks. Its main topics include: security basics, security management and risk assessment, software security, operating systems security, database security, cryptography algorithms and protocols, network au...
Part0 - Introduction to the Course
10mPart1 - Definition of Information Security
17mPart2 - Information Security Terminologies
21mPart3 - Goals of Information Security
24mPart4 - Implementation Issues of the Goals of Information Security - I
15mpart5 - Implementation Issues of the Goals of Information Security - II
20mPart6 - Control Mechanisms for Information Security - I
40mPart 7 - Access Control - Administrative and Technical
19mPart 8 - Passwords - Are they secure? - I
20mPart 9 - Access Control - Administrative and Technical
20mPart 10 - Passwords - Are they secure? - III
22mPart 11 - Multifactor Authentication - Challenges
16mPart 12 - Application Level Control and Information Security Planning
16mPart 13 - Information Security - Policy, Standard and Practice
20mPart 14 - Policies governing Issues, Roles and Responsibilities
20mPart 15 - Managing changes in Information Security Policies
21mPart 16 - Spheres of Information Security
25mPart 01 - Protecting your Personal Computer - I
23mpart 02 - Protecting your Personal Computer - II
21mPart 04 - Cloud Computing (Basic Definitions) - I
19mPart 03 - Protecting your Personal Computer - III
19mPart 05 - Cloud Computing (Deployment) - II
19mPart 06 - Cloud Computing (Security Issues) - III
21mPart 07 - Cloud Computing (Trust and Risk) - IV
24mPart 08 - Cloud Computing (Security and Privacy Issues) - V
23mPart 09 - Cloud Computing (Security and Privacy Issues) - VI
24mPart 10 - Cloud Computing (Application and Data level security) - VII
23mPart 11 - Cloud Computing (Summary) - VIII
23mPart 12 - Standard I
31mPart 13 - Standard II
33mPart 14 - Standard III
18mModule 3 - Part 01
18mModule 3 - Part 02
20mModule 3 - Part 03
13mModule 3 - Part 04
21mModule 3 - Part 05
20mModule 3 - Part 06
23mModule 3 - Part 07
22mModule 3 - Part 08
21mModule 3 - Part 09
12mModule 4 - Part 01
11mModule 4 - Part 02
23mModule 4 - Part 03
20mModule 4 - Part 04
21mModule 4 - Part 05
18mModule 4 - Part 06
21mModule 4 - Part 07
20mModule 4 - Part 08
20mModule 4 - Part 09
20mModule 4 - Part 10
16mModule 5 - Part 01
27mModule 5 - Part 02
37mModule 5 - Part 03
37mModule 5 - Part 04
22mModule 5 - Part 05
22mModule 5 - Part 06
20mModule 5 - Part 07
17mModule 6 - Part 01
20mModule 6 - Part 02
21mModule 6 - Part 03
19mModule 6 - Part 04
22mModule 6 - Part 05
20mModule 6 - Part 06
27mModule 6 - Part 07
22mModule 6 - Part 08
10m