Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Information Security (V-U)

(284 Lectures Available)

S# Lecture Course Institute Instructor Discipline
176
  • 257. CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 3: HARDENED (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
177
  • 258. CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 4: PROTECTED (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
178
  • 259. CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 5: MONITORED (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
179
  • 26. WHAT IS THE OSI SECURITY ARCHITECTURE ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
180
  • 260. CYBER SECURITY MATURITY MATRIX (CSMM), LAYER 6: SECURED (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
181
  • 261. ANOTHER LOOK AT THE INFORMATION SECURITY LIFECYCLE (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
182
  • 262. WHAT IS SECURITY VALIDATION ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
183
  • 263. HOW IS SECURITY VALIDATION PERFORMED ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
184
  • 264. WHAT IS SECURITY TESTING ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
185
  • 265. WHAT IS SECURITY ACCREDITATION ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
186
  • 266. WHAT IS SECURITY ACCREDITATION PART 2 ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
187
  • 267. EMBEDDING INFORMATION SECURITY INTO THE SDLC (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
188
  • 268. SOFTWARE SECURITY TESTING & VALIDATION - PART 1 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
189
  • 269. SOFTWARE SECURITY TESTING & VALIDATION - PART 2 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
190
  • 27. THE NEW FRONTIERS OF ENTERPRISE IT: CLOUD, MOBILE, SOCIAL, IOT (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
191
  • 270. EMBEDDING INFORMATION SECURITY INTO PROJECT MANAGEMENT (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
192
  • 271. HOW TO CONDUCT AN INTERNAL SECURITY ASSESSMENT ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
193
  • 272. WHAT ARE THE DIFFERENT TYPES OF SECURITY ASSESSMENTS ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
194
  • 273. WHAT ARE THE DIFFERENT TYPES OF SECURITY ASSESSMENTS - PART 2? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
195
  • 274. WHAT ARE THE DIFFERENT TYPES OF SECURITY ASSESSMENTS - PART 3? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
196
  • 275. WHAT ARE THE DIFFERENT TYPES OF SECURITY ASSESSMENTS - PART 4? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
197
  • 276. WHAT ARE THE STAGES OF A THIRD PARTY PENETRATION TEST ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
198
  • 277. HOW TO FAIL IN IMPLEMENTING A SUCCESSFUL SECURITY TRANSFORMATION ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
199
  • 278. BENEFITS OF THE SECURITY TRANSFORMATION (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
200
  • 279. SECURITY TRANSFORMATION TIMELINE (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences