Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Information Security (V-U)

(284 Lectures Available)

S# Lecture Course Institute Instructor Discipline
51
  • 144. ASSET MANAGEMENT TOOLS FOR SECURITY FUNCTIONS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
52
  • 145. WHAT IS SECURITY ENGINEERING ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
53
  • 146. WHAT IS THE OBJECTIVE OF SECURITY ENGINEERING ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
54
  • 147. WHOSE RESPONSIBILITY IS SECURITY ENGINEERING ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
55
  • 148. CIS 20 CRITICAL SECURITY CONTROLS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
56
  • 149. CSC1: INVENTORY OF AUTHORIZED AND UNAUTHORIZED DEVICES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
57
  • 15. WHAT IS INFORMATION SECURITY RISK ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
58
  • 150. CSC2: INVENTORY OF AUTHORIZED AND UNAUTHORIZED SOFTWARE (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
59
  • 151. CSC3-I: SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
60
  • 152. CSC3-II: SECURE CONFIGURATIONS FOR HARDWARE AND SOFTWARE (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
61
  • 153. CSC4-I: CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
62
  • 154. CSC4-II: CONTINUOUS VULNERABILITY ASSESSMENT AND REMEDIATION (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
63
  • 155. CSC5-I: CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
64
  • 156. CSC5-II: CONTROLLED USE OF ADMINISTRATIVE PRIVILEGES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
65
  • 157. CSC6-I: MAINTENANCE, MONITORING, AND ANALYSIS OF AUDIT LOGS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
66
  • 158. CSC6-II: MAINTENANCE, MONITORING, AND ANALYSIS OF AUDIT LOGS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
67
  • 159. CSC7-I: EMAIL AND WEB BROWSER PROTECTIONS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
68
  • 16. WHAT DOES THE INFORMATION SECURITY LIFECYCLE LOOK LIKE ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
69
  • 160. CSC7-II: EMAIL AND WEB BROWSER PROTECTIONS (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
70
  • 161. CSC8-I: MALWARE DEFENSES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
71
  • 162. CSC8-II: MALWARE DEFENSES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
72
  • 163. CIS CONTROL 9: LIMITATION AND CONTROL OF NETWORK PORTS, PROTOCOLS, AND SERVICES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
73
  • 164. CIS Control 10: DATA RECOVERY CAPABILITIES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
74
  • 165. CIS CONTROL 11: SECURE CONFIG FOR NETWORK DEVICES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
75
  • 166. CIS CONTROL 11: SECURE CONFIG FOR NETWORK DEVICES-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences