1

Introduction to Information Security I. Instructors: Prof. V. Kamakoti and Prof. Dilip Ayyar, Department of Computer Science and Engineering, IIT Madras.

FREE
This course includes
Hours of videos

1777 years, 7 months

Units & Quizzes

64

Unlimited Lifetime access
Access on mobile app
Certificate of Completion

This course is intended to address the basics of information security concepts and the general industry trends. What is Information Security? Why do you need it? This course is specifically intended for students who want to explore the field of information security, IT professionals who wish to explore the nuances of information security, security professionals who want to revisit the fundamentals, top management and senior management of corporate companies who wish to learn the concept of information security and implement them in their companies, professionals from BFSI segment who wish to understand the depth and average of information security and of course anyone with an aptitude to learn. (from nptel.ac.in)

Course Currilcum

    • Lecture 01 – Definition of Information Security Unlimited
    • Lecture 02 – Information Security Terminologies Unlimited
    • Lecture 03 – Goals of Information Security Unlimited
    • Lecture 04 – Implementation Issues of the Goals of Information Security I Unlimited
    • Lecture 05 – Implementation Issues of the Goals of Information Security II Unlimited
    • Lecture 06 – Control Mechanisms for Information Security Unlimited
    • Lecture 07 – Access Control: Administrative and Technical Unlimited
    • Lecture 08 – Passwords – Are they Secure? Unlimited
    • Lecture 09 – Passwords – Are they Secure? (cont.) Unlimited
    • Lecture 10 – Passwords – Are they Secure? (cont.) Unlimited
    • Lecture 11 – Multi-factor Authentication – Challenges Unlimited
    • Lecture 12 – Application Level Control and Information Security Planning Unlimited
    • Lecture 13 – Information Security – Policy and Standard and Practice Unlimited
    • Lecture 14 – Policies Governing Issues, Roles and Responsibilities Unlimited
    • Lecture 15 – Managing Changes in Information Security Policies Unlimited
    • Lecture 16 – Spheres of Information Security Unlimited
    • Lecture 17 – Protecting Your Personal Computer: Current Challenges to Information Security Unlimited
    • Lecture 18 – Protecting Your Personal Computer: Malicious Software Unlimited
    • Lecture 19 – Protecting Your Personal Computer: Distributed Denial of Service (DDoS) Unlimited
    • Lecture 20 – Cloud Computing: Basic Definitions Unlimited
    • Lecture 21 – Cloud Computing: Deployment Unlimited
    • Lecture 22 – Cloud Computing: Security Issues Unlimited
    • Lecture 23 – Cloud Computing: Trust and Risk Unlimited
    • Lecture 24 – Cloud Computing: Security and Privacy Issues Unlimited
    • Lecture 25 – Cloud Computing: Security and Privacy Issues (cont.) Unlimited
    • Lecture 26 – Cloud Computing: Application and Data Level Security Unlimited
    • Lecture 27 – Cloud Computing: Summary Unlimited
    • Lecture 28 – Standard I: COBIT Unlimited
    • Lecture 29 – Standard II: COBIT (cont.), ISO 27001 Unlimited
    • Lecture 30 – Standard III: Cyber Law Unlimited
    • Lecture 31 – Vulnerability, Threat and Risk Unlimited
    • Lecture 32 – Viruses Unlimited
    • Lecture 33 – Viruses (cont.) Unlimited
    • Lecture 34 – Anti-Virus Technologies, Worms Unlimited
    • Lecture 35 – Command Interface Unlimited
    • Lecture 36 – Introduction to BCP (Business Continuity Plans)/ DRP (Disaster Recovery Plans) Unlimited
    • Lecture 37 – Introduction to BCP/ DRP (cont) Unlimited
    • Lecture 38 – Introduction to BCP/ DRP (cont) Unlimited
    • Lecture 39 – Incident Management Unlimited
    • Lecture 40 – Network Security: Cryptography Unlimited
    • Lecture 41 – Network Security: Public Key Issues Unlimited
    • Lecture 42 – Fundamentals of Networking Unlimited
    • Lecture 43 – Assessment of Security Devices: Web Filtering Unlimited
    • Lecture 44 – Assessment of Security Devices: Firewalls, IDS/IPS, Routers Unlimited
    • Lecture 45 – Penetration Testing Unlimited
    • Lecture 46 – Penetration Testing (cont.) Unlimited
    • Lecture 47 – Data Center Audits Unlimited
    • Lecture 48 – Security of Application Software Unlimited
    • Lecture 49 – DBMS Security Guidelines, SAP Security, Desktop Security Unlimited
    • Lecture 50 – Computer Security – Principles and Practice Unlimited
    • Lecture 51 – Windows and Linux Security Unlimited
    • Lecture 52 – Windows and Linux security (cont.) Unlimited
    • Lecture 53 – System Hardening Unlimited
    • Lecture 54 – System Hardening (cont.) Unlimited
    • Lecture 55 – OS Security Capabilities: Linux vs Windows Unlimited
    • Lecture 56 – OS Security Capabilities: Linux vs Windows (cont.) Unlimited
    • Lecture 57 – Web Application Security Unlimited
    • Lecture 58 – HTTP Requests – Post; Web Application Vulnerabilities Unlimited
    • Lecture 59 – How to Secure Web Applications Unlimited
    • Lecture 60 – OWASP (Open Web Application Security Project) Unlimited
    • Lecture 61 – OWASP (cont.) Unlimited
    • Lecture 62 – XSS (Cross-Site Scripting) Unlimited
    • Lecture 63 – Sensitive Data Exposure, CSRF (Cross-Site Request Forgery) Unlimited
    • Lecture 64 – Summary of OWASP Module Unlimited