Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Information Security (V-U)

(284 Lectures Available)

S# Lecture Course Institute Instructor Discipline
76
  • 167. CIS CONTROL 12: BOUNDARY DEFENSE-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
77
  • 168. CIS CONTROL 12: BOUNDARY DEFENSE-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
78
  • 169. CIS CONTROL 12: BOUNDARY DEFENSE-III (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
79
  • 17. WHAT IS MANAGEMENT COMMITMENT ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
80
  • 170. CIS CONTROL 13: DATA PROTECTION-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
81
  • 171. CIS CONTROL 13: DATA PROTECTION-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
82
  • 172. CIS CONTROL 13: DATA PROTECTION-III (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
83
  • 173. CIS CONTROL 14: CONTROLLED ACCESS BASED ON NEED TO KNOW-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
84
  • 174. CIS CONTROL 14: CONTROLLED ACCESS BASED ON NEED TO KNOW-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
85
  • 175. CIS CONTROL 15: WIRELESS ACCESS CONTROL-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
86
  • 176. CIS CONTROL 15: WIRELESS ACCESS CONTROL-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
87
  • 177. CIS CONTROL 15: WIRELESS ACCESS CONTROL-III (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
88
  • 178. CIS CONTROL 16: ACCOUNT MONITORING & CONTROL-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
89
  • 179. CIS CONTROL 16: ACCOUNT MONITORING & CONTROL-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
90
  • 18. WHOSE RESPONSIBILITY IS IMPLEMENTATION OF INFORMATION SECURITY ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
91
  • 180. CIS CONTROL 16: ACCOUNT MONITORING & CONTROL-III (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
92
  • 181. CIS CONTROL 17: IMPLEMENT A SECURITY AWARENESS & TRAINING PROGRAM-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
93
  • 182. CIS CONTROL 17: IMPLEMENT A SECURITY AWARENESS & TRAINING PROGRAM-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
94
  • 183. CIS CONTROL 18: APPLICATION SOFTWARE SECURITY-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
95
  • 184. CIS CONTROL 18: APPLICATION SOFTWARE SECURITY-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
96
  • 185. CIS CONTROL 18: APPLICATION SOFTWARE SECURITY-III (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
97
  • 186. CIS CONTROL 19: INCIDENT RESPONSE & MANAGEMENT-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
98
  • 187. CIS CONTROL 19: INCIDENT RESPONSE & MANAGEMENT-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
99
  • 188. CIS CONTROL 20: PENETRATION TESTS & RED TEAM EXERCISES-I (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
100
  • 189. CIS CONTROL 20: PENETRATION TESTS & RED TEAM EXERCISES-II (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences