Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Information Security (V-U)

(284 Lectures Available)

S# Lecture Course Institute Instructor Discipline
1
  • 1. WHAT IS INFORMATION SECURITY ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
2
  • 10. WHAT IS AN INFORMATION SECURITY PROGRAM ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
3
  • 100. CASE STUDY SECURITY HARDENING - C++ APPLICATIONS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
4
  • 101. CASE STUDY SECURITY HARDENING - JAVA APPLICATIONS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
5
  • 102. CASE STUDY SECURITY HARDENING PERL APPLICATIONS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
6
  • 103. CASE STUDY SECURITY HARDENING - MOBILE DEVICES - ANDROID (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
7
  • 104. CASE STUDY SECURITY HARDENING - MOBILE DEVICES - IOS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
8
  • 105. SECURITY HARDENING OF ASTERISK VOIP - PART 1 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
9
  • 106. SECURITY HARDENING OF ASTERISK VOIP - PART 2 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
10
  • 107. VERSION CONTROL FOR IT ASSETS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
11
  • 108. SOFTWARE VERSION CONTROL BEST PRACTICES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
12
  • 109. SECURITY HARDENING - SECURE SOFTWARE IMAGES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
13
  • 11. WHAT IS THE ROLE OF PEOPLE, PROCESS, AND TECHNOLOGY IN INFORMATION SECURITY ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
14
  • 110. MANUAL AND AUTOMATED WORK IN SECURITY HARDENING (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
15
  • 111. QUALYS DEMO - SECURITY HARDENING (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
16
  • 112. QUALYS DEMO - SECURITY HARDENING II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
17
  • 113. SECURITY HARDENING LIFECYCLE - MAINTAINING AN INTEGRATED AND CURRENT PROGRAM (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
18
  • 114. HOW TO SECURITY HARDEN IT ASSETS FOR WHICH BENCHMARK OR STIG IS NOT AVAILABLE ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
19
  • 115. QUALYS POLICY LIBRARIES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
20
  • 116. SECURITY HARDENING FOR OUTSOURCED IT ASSETS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
21
  • 117. WHAT IS VULNERABILITY MANAGEMENT (VM) ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
22
  • 118. WHAT ARE THE STEPS IN A VULNERABILITY MANAGEMENT LIFECYCLE ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
23
  • 119. WHY IS SOFTWARE INSECURE ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
24
  • 12. WHAT IS THE ROLE OF AN INFORMATION SECURITY MANAGER ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
25
  • 120. WHY IS A VULNERABILITY MANAGEMENT PROGRAM REQUIRED ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences