Introduction to Information Security I
Introduction to Information Security I. Instructors: Prof. V. Kamakoti and Prof. Dilip Ayyar, Department of Computer Science and Engineering, IIT Madras. This course is intended to address the basics of information security concepts and the general industry trends. What is Information Security? Why do you need it? This course is specifically intended for students who want to explore the field of information security, IT professionals who wish to explore the nuances of information security, security professionals who want to revisit the fundamentals, top management and senior management of corporate companies who wish to learn the concept of information security and implement them in their companies, professionals from BFSI segment who wish to understand the depth and average of information security and of course anyone with an aptitude to learn.
(from nptel.ac.in)
What is Information Security? Why do you need it? |
Lecture 01 - Definition of Information Security |
Lecture 02 - Information Security Terminologies |
Lecture 03 - Goals of Information Security |
Lecture 04 - Implementation Issues of the Goals of Information Security I |
Lecture 05 - Implementation Issues of the Goals of Information Security II |
Lecture 06 - Control Mechanisms for Information Security |
Lecture 07 - Access Control: Administrative and Technical |
Lecture 08 - Passwords - Are they Secure? |
Lecture 09 - Passwords - Are they Secure? (cont.) |
Lecture 10 - Passwords - Are they Secure? (cont.) |
Lecture 11 - Multi-factor Authentication - Challenges |
Lecture 12 - Application Level Control and Information Security Planning |
Lecture 13 - Information Security - Policy and Standard and Practice |
Lecture 14 - Policies Governing Issues, Roles and Responsibilities |
Lecture 15 - Managing Changes in Information Security Policies |
Lecture 16 - Spheres of Information Security |
Information Security in Today's World |
Lecture 17 - Protecting Your Personal Computer: Current Challenges to Information Security |
Lecture 18 - Protecting Your Personal Computer: Malicious Software |
Lecture 19 - Protecting Your Personal Computer: Distributed Denial of Service (DDoS) |
Lecture 20 - Cloud Computing: Basic Definitions |
Lecture 21 - Cloud Computing: Deployment |
Lecture 22 - Cloud Computing: Security Issues |
Lecture 23 - Cloud Computing: Trust and Risk |
Lecture 24 - Cloud Computing: Security and Privacy Issues |
Lecture 25 - Cloud Computing: Security and Privacy Issues (cont.) |
Lecture 26 - Cloud Computing: Application and Data Level Security |
Lecture 27 - Cloud Computing: Summary |
Lecture 28 - Standard I: COBIT |
Lecture 29 - Standard II: COBIT (cont.), ISO 27001 |
Lecture 30 - Standard III: Cyber Law |
Vulnerability, Threat and Risk, Risk Assessment and Mitigation |
Lecture 31 - Vulnerability, Threat and Risk |
Lecture 32 - Viruses |
Lecture 33 - Viruses (cont.) |
Lecture 34 - Anti-Virus Technologies, Worms |
Lecture 35 - Command Interface |
Lecture 36 - Introduction to BCP (Business Continuity Plans)/ DRP (Disaster Recovery Plans) |
Lecture 37 - Introduction to BCP/ DRP (cont) |
Lecture 38 - Introduction to BCP/ DRP (cont) |
Lecture 39 - Incident Management |
Network Security |
Lecture 40 - Network Security: Cryptography |
Lecture 41 - Network Security: Public Key Issues |
Lecture 42 - Fundamentals of Networking |
Lecture 43 - Assessment of Security Devices: Web Filtering |
Lecture 44 - Assessment of Security Devices: Firewalls, IDS/IPS, Routers |
Lecture 45 - Penetration Testing |
Lecture 46 - Penetration Testing (cont.) |
Lecture 47 - Data Center Audits |
Lecture 48 - Security of Application Software |
Lecture 49 - DBMS Security Guidelines, SAP Security, Desktop Security |
Computer Security |
Lecture 50 - Computer Security - Principles and Practice |
Lecture 51 - Windows and Linux Security |
Lecture 52 - Windows and Linux security (cont.) |
Lecture 53 - System Hardening |
Lecture 54 - System Hardening (cont.) |
Lecture 55 - OS Security Capabilities: Linux vs Windows |
Lecture 56 - OS Security Capabilities: Linux vs Windows (cont.) |
Web Application Security |
Lecture 57 - Web Application Security |
Lecture 58 - HTTP Requests - Post; Web Application Vulnerabilities |
Lecture 59 - How to Secure Web Applications |
Lecture 60 - OWASP (Open Web Application Security Project) |
Lecture 61 - OWASP (cont.) |
Lecture 62 - XSS (Cross-Site Scripting) |
Lecture 63 - Sensitive Data Exposure, CSRF (Cross-Site Request Forgery) |
Lecture 64 - Summary of OWASP Module |
References |
Introduction to Information Security I
Instructors: Prof. V. Kamakoti and Prof. Dilip Ayyar, Department of Computer Science and Engineering, IIT Madras. This course is intended to address the basics of information security concepts and the general industry trends.
|