Lecture

Right Arrow

SEARCH COURSES / LECTURES

Left Arrow

Information Security (V-U)

(284 Lectures Available)

S# Lecture Course Institute Instructor Discipline
201
  • 28. VIRTUALIZATION AND ENTERPRISE SECURITY (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
202
  • 280. WHOSE RESPONSIBILITY IS THE SECURITY TRANSFORMATION ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
203
  • 281. RAISING MANAGEMENT SUPPORT FOR SECURITY TRANSFORMATION PROJECT (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
204
  • 282. KEY QUESTIONS TO ASSESS SECURITY POSTURE OF THE ORGANIZATION (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
205
  • 283. KEY LEADERSHIP QUALITIES OF THE SECURITY TRANSFORMATION HEAD (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
206
  • 284. COURSE WRAP-UP (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
207
  • 29. CASE STUDY OF ENTERPRISE - SMALL ORGANIZATION (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
208
  • 3. WHO IS INFORMATION SECURITY FOR ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
209
  • 30. CASE STUDY OF ENTERPRISE - MEDIUM SIZED ORGANIZATION (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
210
  • 31. CASE STUDY OF ENTERPRISE - LARGE SIZED ORGANIZATION (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
211
  • 32. WHAT IS THE TYPICAL STRUCTURE OF AN IT TEAM ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
212
  • 33. WHAT ARE THE OBJECTIVES AND KPIs OF A CIO AND IT TEAM ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
213
  • 34. HOW DO THE IT TEAM INTERACT WITH OTHER STAKEHOLDERS IN THE ORGANIZATION ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
214
  • 35. SECURITY OVERLAY OF AN ENTERPRISE ARCHITECTURE - I (COMPONENTS) (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
215
  • 36. SECURITY OVERLAY OF AN ENTERPRISE ARCHITECTURE - II (TRAFFIC FLOWS) (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
216
  • 37. SECURITY OVERLAY OF AN ENTERPRISE ARCHITECTURE - III (GENERAL SECURITY DESIGN) (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
217
  • 38. WHAT IS HIGH AVAILABILITY (HA) ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
218
  • 39. HIGH AVAILABILITY DESIGN (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
219
  • 4. HOW IS INFORMATION SECURITY IMPLEMENTED ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
220
  • 40. HOW IS SITE REDUNDANCY INCORPORATED INTO ENTERPRISE NETWORK DESIGN ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
221
  • 41. HIGH AVAILABILITY AND REDUNDANCY CASE STUDY (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
222
  • 42. BACKUP STRATEGIES (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
223
  • 43. WHAT IS THE ROLE OF SECURITY TOOLS IN SECURING THE ENTERPRISE ARCHITECTURE ? (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
224
  • 44. TYPICAL SECURITY TOOLS USED IN AN ENTERPRISE IT NETWORK - PART 1 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences
225
  • 45. TYPICAL SECURITY TOOLS USED IN AN ENTERPRISE IT NETWORK - PART 2 (V-U)
Information Security (V-U) Virtual University Nahil Mehmood Social Sciences