Главная
Study mode:
on
1
Introduction to the Course
2
Part1 - Definition of Information Security
3
Part 2 - Information Security Terminologies
4
Part3 - Goals of Information Security
5
Part 4 Implementation Issues of the Goals of Information Security - I
6
Part5 - Implementation Issues of the Goals of Information Security - II
7
Part6 - Control Mechanisms for Information Security - I
8
Part 7 - Access Control - Administrative and Technical
9
Part 8 - Passwords - Are they secure? - I
10
Part 9 - Access Control - Administrative and Technical
11
Part 10 - Passwords - Are they secure? - III
12
Part 11 - Multifactor Authentication - Challenges
13
Part 12 - Application Level Control and Information Security Planning
14
Part 13 - Information Security - Policy, Standard and Practice
15
Part 14 - Policies governing Issues, Roles and Responsibilities
16
Part 15 - Managing changes in Information Security Policies
17
Part 16 - Spheres of Information Security
18
Part 01 - Protecting your Personal Computer - I
19
Part 02 - Protecting your Personal Computer - II
20
Part 03 - Protecting your Personal Computer - III
21
Part 04 - Cloud Computing (Basic Definitions) - I
22
Part 05 - Cloud Computing (Deployment) - II
23
Part 06 - Cloud Computing (Security Issues) - III
24
Part 07 - Cloud Computing (Trust and Risk) - IV
25
Part 08 - Cloud Computing (Security and Privacy Issues) - V
26
Part 09 - Cloud Computing (Security and Privacy Issues) - VI
27
Part 10 - Cloud Computing (Application and Data level security) - VII
28
Part 11 - Cloud Computing (Summary) - VIII
29
Part 12 - Standard I
30
Part 13 - Standard II
31
Part 14 - Standard III
32
Module 3 Part 1
33
Module 3 Part 2
34
Module 3 Part 3
35
Module 3 Part 4
36
Module 3 Part 5
37
Module 3 Part 6
38
Module 3 Part 7
39
Module 3 Part 8
40
Module 3 Part 9
41
Module 4 Part 10
42
Module 4 Part 1
43
Module 4 Part 2
44
Module 4 Part 3
45
Module 4 Part 4
46
Module 4 Part 5
47
Module 4 Part 6
48
Module 4 Part 7
49
Module 4 Part 8
50
Module 4 Part 9
51
Module 5 Part 1
52
Module 5 Part 2
53
Module 5 Part 3
54
Module 5 Part 4
55
Module 5 Part 5
56
Module 5 Part 6
57
Module 5 Part 7
58
Module 6 Part 1
59
Module 6 Part 2
60
Module 6 Part 3
61
Module 6 Part 4
62
Module 6 Part 5
63
Module 6 Part 6
64
Module 6 Part 7
65
Module 6 Part 8
Description:
The level 1 course is intended to address the basics of information Security Concepts and the general industry trends. We will be covering the following topics: What is Information Security? Why do you need it?  Basic Principles of Confidentiality, Integrity Availability Concepts Policies, procedures, Guidelines, Standards Administrative Measures and Technical Measures, People, Process, Technology Current Trends in information Security, Cloud Computing: benefits and Issues related to info Sec. Standards available for InfoSec: Cobit, Cadbury, ISO 27001, OWASP, OSSTMM, etc - An Overview, Certifiable Standards: How, What, When, Who. Vulnerability, Threat and Risk, Risk Assessment and Mitigation + Quick fixes, Introduction to BCP / DRP / Incident management, Segregation and Separation of Duties & Roles and responsibilities, IT ACT 2000 Types of assessments for Information Security - VAPT of Networks; Web Appln Audits; IT assessments or audits; Assessment of Network Equipments; Assessment of Security Devices (Web Filtering, Firewalls, IDS / IPS, Routers; Data Center Assessment; Security of Application Software; SAP Security; Desktop Security; RDBMS Security; BCP / DRP assessments; Policy reviews; Network Security & Common and Popular Tools Used Windows and Linux security, Types of Audits in Windows Environment: Server Security, Active Directory (Group Policy), Anti-Virus, Mails, Malware, End point protection, Shadow Passwords, SUDO users, etc Web Application Security: OWASP, Common Issues in Web Apps, What is XSS, SQL injection, CSRF, Password Vulnerabilities, SSL, CAPTCHA, Session Hijacking, Local and Remote File Inclusion, Audit Trails, Web Server Issues, etc Read more

Introduction to Information Security

NPTEL
Add to list
0:00 / 0:00