Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Information Security (V-U)

(284 Lectures Available)

S# Lecture Course Institute Instructor Discipline
226
  • 46. WHAT DOES THE TERM "BOX SECURITY" MEAN ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
227
  • 47. WHAT IS THE BEST APPROACH TO SECURE THE IT ENTERPRISE ARCHITECTURE ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
228
  • 48. WHAT IS DISASTER RECOVERY (DR) ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
229
  • 49. WHAT IS BUSINESS CONTINUITY ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
230
  • 5. WHO ARE THE PLAYERS IN INFORMATION SECURITY ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
231
  • 50. HOW IS DR ACCOMODATED INTO THE ENTERPRISE ARCHITECTURE -PART 1? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
232
  • 51. HOW IS DR ACCOMODATED INTO THE ENTERPRISE ARCHITECTURE -PART 2? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
233
  • 52. WHAT IS THE ROLE OF AN IT ASSET IN SECURING THE ORGANIZATION ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
234
  • 53. HOW TO DETERMINE SECURITY POSTURE OF AN ORGANIZATION ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
235
  • 54. HOW DO YOU DRIVE A SUCCESSFUL INFORMATION SECURITY TRANSFORMATION ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
236
  • 55. DIFFERENCE BETWEEN SECURITY HARDENING & PATCHING (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
237
  • 56. SECURITY HARDENING STRATEGY (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
238
  • 57. PREREQUISITES FOR THE SECURITY HARDENING PROGRAM (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
239
  • 58. WHO WILL CONDUCT THE SECURITY HARDENING ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
240
  • 59. WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 1) (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
241
  • 6. WHAT ARE THE FOUR LAYERS OF INFORMATION SECURITY TRANSFORMATION FRAMEWORK ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
242
  • 60. WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 2) (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
243
  • 61. WHAT IS THE 8-STEP METHODOLOGY FOR SECURITY HARDENING ? (PART 3) (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
244
  • 62. A LOOK AT CIS SECURITY BENCHMARKS-PART 1 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
245
  • 63. A LOOK AT CIS SECURITY BENCHMARKS-PART 2 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
246
  • 64. A LOOK AT CIS SECURITY BENCHMARKS-PART 3 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
247
  • 65. A LOOK AT CIS SECURITY BENCHMARKS-PART 4 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
248
  • 66. A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 1 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
249
  • 67. A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 2 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
250
  • 68. A LOOK AT DISA SECURITY TECHNICAL IMPLEMENTATION GUIDES (STIGs) - PART 3 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences