Introduction to Information Security I
Introduction to Information Security I. Instructors: Prof. V. Kamakoti and Prof. Dilip Ayyar, Department of Computer Science and Engineering, IIT Madras. This course is intended to address the basics of information security concepts and the general industry trends. What is Information Security? Why do you need it? This course is specifically intended for students who want to explore the field of information security, IT professionals who wish to explore the nuances of information security, security professionals who want to revisit the fundamentals, top management and senior management of corporate companies who wish to learn the concept of information security and implement them in their companies, professionals from BFSI segment who wish to understand the depth and average of information security and of course anyone with an aptitude to learn.
(from nptel.ac.in )
Lecture 46 - Penetration Testing (cont.)
VIDEO
Go to the Course Home or watch other lectures:
What is Information Security? Why do you need it?
Lecture 01 - Definition of Information Security
Lecture 02 - Information Security Terminologies
Lecture 03 - Goals of Information Security
Lecture 04 - Implementation Issues of the Goals of Information Security I
Lecture 05 - Implementation Issues of the Goals of Information Security II
Lecture 06 - Control Mechanisms for Information Security
Lecture 07 - Access Control: Administrative and Technical
Lecture 08 - Passwords - Are they Secure?
Lecture 09 - Passwords - Are they Secure? (cont.)
Lecture 10 - Passwords - Are they Secure? (cont.)
Lecture 11 - Multi-factor Authentication - Challenges
Lecture 12 - Application Level Control and Information Security Planning
Lecture 13 - Information Security - Policy and Standard and Practice
Lecture 14 - Policies Governing Issues, Roles and Responsibilities
Lecture 15 - Managing Changes in Information Security Policies
Lecture 16 - Spheres of Information Security
Information Security in Today's World
Lecture 17 - Protecting Your Personal Computer: Current Challenges to Information Security
Lecture 18 - Protecting Your Personal Computer: Malicious Software
Lecture 19 - Protecting Your Personal Computer: Distributed Denial of Service (DDoS)
Lecture 20 - Cloud Computing: Basic Definitions
Lecture 21 - Cloud Computing: Deployment
Lecture 22 - Cloud Computing: Security Issues
Lecture 23 - Cloud Computing: Trust and Risk
Lecture 24 - Cloud Computing: Security and Privacy Issues
Lecture 25 - Cloud Computing: Security and Privacy Issues (cont.)
Lecture 26 - Cloud Computing: Application and Data Level Security
Lecture 27 - Cloud Computing: Summary
Lecture 28 - Standard I: COBIT
Lecture 29 - Standard II: COBIT (cont.), ISO 27001
Lecture 30 - Standard III: Cyber Law
Vulnerability, Threat and Risk, Risk Assessment and Mitigation
Lecture 31 - Vulnerability, Threat and Risk
Lecture 32 - Viruses
Lecture 33 - Viruses (cont.)
Lecture 34 - Anti-Virus Technologies, Worms
Lecture 35 - Command Interface
Lecture 36 - Introduction to BCP (Business Continuity Plans)/ DRP (Disaster Recovery Plans)
Lecture 37 - Introduction to BCP/ DRP (cont)
Lecture 38 - Introduction to BCP/ DRP (cont)
Lecture 39 - Incident Management
Network Security
Lecture 40 - Network Security: Cryptography
Lecture 41 - Network Security: Public Key Issues
Lecture 42 - Fundamentals of Networking
Lecture 43 - Assessment of Security Devices: Web Filtering
Lecture 44 - Assessment of Security Devices: Firewalls, IDS/IPS, Routers
Lecture 45 - Penetration Testing
Lecture 46 - Penetration Testing (cont.)
Lecture 47 - Data Center Audits
Lecture 48 - Security of Application Software
Lecture 49 - DBMS Security Guidelines, SAP Security, Desktop Security
Computer Security
Lecture 50 - Computer Security - Principles and Practice
Lecture 51 - Windows and Linux Security
Lecture 52 - Windows and Linux security (cont.)
Lecture 53 - System Hardening
Lecture 54 - System Hardening (cont.)
Lecture 55 - OS Security Capabilities: Linux vs Windows
Lecture 56 - OS Security Capabilities: Linux vs Windows (cont.)
Web Application Security
Lecture 57 - Web Application Security
Lecture 58 - HTTP Requests - Post; Web Application Vulnerabilities
Lecture 59 - How to Secure Web Applications
Lecture 60 - OWASP (Open Web Application Security Project)
Lecture 61 - OWASP (cont.)
Lecture 62 - XSS (Cross-Site Scripting)
Lecture 63 - Sensitive Data Exposure, CSRF (Cross-Site Request Forgery)
Lecture 64 - Summary of OWASP Module