Menu
|
111-222-292 (Ext: 245)
Home
|
About US
|
Creditors
|
Mentorship
|
Faq
Home
About US
Creditors
Mentorship
Faq
Lecture
SEARCH COURSES / LECTURES
Search Lectures
Search Courses
All Disciplines
Basic and Health Sciences
Applied Sciences
Social Sciences
All Levels
Undergraduate
School
College
Graduate
All Institutes
Khan Academy Urdu
Virtual Education Project Pakistan (VEPP)
Harvard
UCI Open
MIT
Oxford
Yale University
Khan Academy
Udacity
Stanford
Virtual University
Home
>>
Applied Sciences
>>
Computer Science
>>
Information Security (V-U)
Information Security (V-U)
(284 Lectures Available)
S#
Lecture
Course
Institute
Instructor
Discipline
226
46. WHAT DOES THE TERM "BOX SECURITY" MEAN ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
227
47. WHAT IS THE BEST APPROACH TO SECURE THE IT ENTERPRISE ARCHITECTURE ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
228
48. WHAT IS DISASTER RECOVERY (DR) ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
229
49. WHAT IS BUSINESS CONTINUITY ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
230
5. WHO ARE THE PLAYERS IN INFORMATION SECURITY ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
231
50. HOW IS DR ACCOMODATED INTO THE ENTERPRISE ARCHITECTURE -PART 1? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
232
51. HOW IS DR ACCOMODATED INTO THE ENTERPRISE ARCHITECTURE -PART 2? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
233
52. WHAT IS THE ROLE OF AN IT ASSET IN SECURING THE ORGANIZATION ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
234
53. HOW TO DETERMINE SECURITY POSTURE OF AN ORGANIZATION ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
235
54. HOW DO YOU DRIVE A SUCCESSFUL INFORMATION SECURITY TRANSFORMATION ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
236
55. DIFFERENCE BETWEEN SECURITY HARDENING & PATCHING (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
237
56. SECURITY HARDENING STRATEGY (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
238
57. PREREQUISITES FOR THE SECURITY HARDENING PROGRAM (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
239
58. WHO WILL CONDUCT THE SECURITY HARDENING ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
240
59. WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 1) (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
241
6. WHAT ARE THE FOUR LAYERS OF INFORMATION SECURITY TRANSFORMATION FRAMEWORK ? (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
242
60. WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 2) (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
243
61. WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 3) (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
244
62. A LOOK AT CIS SECURITY BENCHMARKS-PART 1 (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
245
63. A LOOK AT CIS SECURITY BENCHMARKS-PART 2 (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
246
64. A LOOK AT CIS SECURITY BENCHMARKS-PART 3 (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
247
65. A LOOK AT CIS SECURITY BENCHMARKS-PART 4 (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
248
66. A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 1 (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
249
67. A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 2 (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
250
68. A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 3 (V-U)
Information Security (V-U)
Virtual University
Nahil Mehmood
Social Sciences
‹
1
2
3
4
5
6
7
8
9
10
11
12
›
Basic and Health Sciences
Biology
Chemistry
Mathematics
Physics
Medicine
Test Prep
Applied Sciences
Agricultural Science
Computer Science
Earth, Atmospheric, and Planetary Sciences
Energy
Engineering
Healthcare
Social Sciences
Business and Finance
Economics
English
History
Arts and Humanities
Law
Literature and Linguistics
Management
Marketing
Mass Communication
Philosophy
Physical Education
Political Science
Psychology
Sociology