Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Information Security (V-U)

(284 Lectures Available)

S# Lecture Course Institute Instructor Discipline
26
  • 121. WHAT IS CVE, AND VULNERABILITY BULLETIN ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
27
  • 122. WHAT IS AN EXPLOIT ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
28
  • 123. IMPORTANCE OF AN EFFECTIVE VULNERABILITY MANAGEMENT PROGRAM AT STAGE 2 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
29
  • 124. CASE STUDY - HOW SYSTEM VULNERABILITIES PLAYED A PART IN SECURITY BREACH ? (PART 1) (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
30
  • 125. CASE STUDY - HOW SYSTEM VULNERABILITIES PLAYED A PART IN SECURITY BREACH ? (PART 2) (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
31
  • 126. BEST PRACTICES FOR APPLYING SECURITY PATCHES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
32
  • 127. WHO CONDUCTS THE VULNERABILITY MANAGEMENT ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
33
  • 128. VULNERABILITY SCANNING TOOLS - NESSUS FEATURES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
34
  • 129. VULNERABILITY SCANNING TOOLS - QUALYS FEATURES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
35
  • 13. WHAT IS INFORMATION SECURITY AWARENESS ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
36
  • 130. CASE STUDY - NESSUS DEMO - PART 1 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
37
  • 131. CASE STUDY - NESSUS DEMO - PART 2 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
38
  • 132. CASE STUDY - NESSUS DEMO - PART 3 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
39
  • 133. CASE STUDY - QUALYS DEMO - PART 1 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
40
  • 134. CASE STUDY - QUALYS DEMO - PART 2 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
41
  • 135. CASE STUDY - QUALYS DEMO - PART 3 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
42
  • 136. HOW DO VULNERABILITY MANAGEMENT SCANNERS WORK ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
43
  • 137. QUALYS WEB APPLICATION SCANNING (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
44
  • 138. QUALYS ADDITIONAL FEATURES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
45
  • 139. OPENVAS OPEN SOURCE VULNERABILITY SCANNER (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
46
  • 14. WHAT ARE THE LEADING INFORMATION SECURITY STANDARDS, AND FRAMEWORKS ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
47
  • 140. SUGGESTED FREQUENCY FOR THE VULNERABILITY MANAGEMENT PROGRAM (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
48
  • 141. POTENTIAL CHALLENGES AND PITFALLS IN THE VULNERABILITY MANAGEMENT PROGRAM (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
49
  • 142. ASSET MANAGEMENT - MAINTAINING THE ENTERPRISE ASSETS - CHALLENGES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
50
  • 143. ASSET MANAGEMENT THROUGH QUALYS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences