NOC:Introduction to Information Security I


Lecture 1 - Module 1 - Part 0 - Introduction to the Course


Lecture 2 - Module 1 - Part 1 - Definition of Information Security


Lecture 3 - Module 1 - Part 2 - Information Security Terminologies


Lecture 4 - Module 1 - Part 3 - Goals of Information Security


Lecture 5 - Module 1 - Part 4 - Implementation Issues of the Goals of Information Security - I


Lecture 6 - Module 1 - Part 5 - Implementation Issues of the Goals of Information Security - II


Lecture 7 - Module 1 - Part 6 - Control Mechanisms for Information Security - I


Lecture 8 - Module 1 - Part 7 - Access Control - Administrative and Technical


Lecture 9 - Module 1 - Part 8 - Passwords - Are they secure? - I


Lecture 10 - Module 1 - Part 9 - Access Control - Administrative and Technical


Lecture 11 - Module 1 - Part 10 - Passwords - Are they secure? - III


Lecture 12 - Module 1 - Part 11 - Multifactor Authentication - Challenges


Lecture 13 - Module 1 - Part 12 - Application Level Control and Information Security Planning


Lecture 14 - Module 1 - Part 13 - Information Security - Policy, Standard and Practice


Lecture 15 - Module 1 - Part 14 - Policies governing Issues, Roles and Responsibilities


Lecture 16 - Module 1 - Part 15 - Managing changes in Information Security Policies


Lecture 17 - Module 1 - Part 16 - Spheres of Information Security


Lecture 18 - Module 2 - Part 1 - Protecting your Personal Computer - I


Lecture 19 - Module 2 - part 2 - Protecting your Personal Computer - II


Lecture 20 - Module 2 - Part 3 - Protecting your Personal Computer - III


Lecture 21 - Module 2 - Part 4 - Cloud Computing (Basic Definitions) - I


Lecture 22 - Module 2 - Part 5 - Cloud Computing (Deployment) - II


Lecture 23 - Module 2 - Part 6 - Cloud Computing (Security Issues) - III


Lecture 24 - Module 2 - Part 7 - Cloud Computing (Trust and Risk) - IV


Lecture 25 - Module 2 - Part 8 - Cloud Computing (Security and Privacy Issues) - V


Lecture 26 - Module 2 - Part 9 - Cloud Computing (Security and Privacy Issues) - VI


Lecture 27 - Module 2 - Part 10 - Cloud Computing (Application and Data level security) - VII


Lecture 28 - Module 2 - Part 11 - Cloud Computing (Summary) - VIII


Lecture 29 - Module 2 - Part 12 - Standard I


Lecture 30 - Module 2 - Part 13 - Standard II


Lecture 31 - Module 2 - Part 14 - Standard III


Lecture 32 - Module 3 - Part 1


Lecture 33 - Module 3 - Part 2


Lecture 34 - Module 3 - Part 3


Lecture 35 - Module 3 - Part 4


Lecture 36 - Module 3 - Part 5


Lecture 37 - Module 3 - Part 6


Lecture 38 - Module 3 - Part 7


Lecture 39 - Module 3 - Part 8


Lecture 40 - Module 3 - Part 9


Lecture 41 - Module 4 - Part 1


Lecture 42 - module 4 - Part 2


Lecture 43 - Module 4 - Part 3


Lecture 44 - Module 4 - Part 4


Lecture 45 - Module 4 - Part 5


Lecture 46 - Module 4 - Part 6


Lecture 47 - Module 4 - Part 7


Lecture 48 - Module 4 - Part 8


Lecture 49 - Module 4 - Part 9


Lecture 50 - Module 4 - Part 10


Lecture 51 - Module 5 - Part 1


Lecture 52 - Module 5 - Part 2


Lecture 53 - Module 5 - Part 3


Lecture 54 - Module 5 - Part 4


Lecture 55 - Module 5 - Part 5


Lecture 56 - Module 5 - Part 6


Lecture 57 - Module 5 - Part 7


Lecture 58 - Module 6 - Part 1


Lecture 59 - Module 6 - Part 2


Lecture 60 - Module 6 - Part 3


Lecture 61 - Module 6 - Part 4


Lecture 62 - Module 6 - Part 5


Lecture 63 - Module 6 - Part 6


Lecture 64 - Module 6 - Part 7


Lecture 65 - Module 6 - Part 8