Sl.No | Chapter Name | MP4 Download |
---|---|---|
1 | Part0 - Introduction to the Course | Download |
2 | Part1 - Definition of Information Security | Download |
3 | Part2 - Information Security Terminologies | Download |
4 | Part3 - Goals of Information Security | Download |
5 | Part4 - Implementation Issues of the Goals of Information Security - I | Download |
6 | part5 - Implementation Issues of the Goals of Information Security - II | Download |
7 | Part6 - Control Mechanisms for Information Security - I | Download |
8 | Part 7 - Access Control - Administrative and Technical | Download |
9 | Part 8 - Passwords - Are they secure? - I | Download |
10 | Part 9 - Access Control - Administrative and Technical | Download |
11 | Part 10 - Passwords - Are they secure? - III | Download |
12 | Part 11 - Multifactor Authentication - Challenges | Download |
13 | Part 12 - Application Level Control and Information Security Planning | Download |
14 | Part 13 - Information Security - Policy, Standard and Practice | Download |
15 | Part 14 - Policies governing Issues, Roles and Responsibilities | Download |
16 | Part 15 - Managing changes in Information Security Policies | Download |
17 | Part 16 - Spheres of Information Security | Download |
18 | Part 01 - Protecting your Personal Computer - I | Download |
19 | part 02 - Protecting your Personal Computer - II | Download |
20 | Part 03 - Protecting your Personal Computer - III | Download |
21 | Part 04 - Cloud Computing (Basic Definitions) - I | Download |
22 | Part 05 - Cloud Computing (Deployment) - II | Download |
23 | Part 06 - Cloud Computing (Security Issues) - III | Download |
24 | Part 07 - Cloud Computing (Trust and Risk) - IV | Download |
25 | Part 08 - Cloud Computing (Security and Privacy Issues) - V | Download |
26 | Part 09 - Cloud Computing (Security and Privacy Issues) - VI | Download |
27 | Part 10 - Cloud Computing (Application and Data level security) - VII | Download |
28 | Part 11 - Cloud Computing (Summary) - VIII | Download |
29 | Part 12 - Standard I | Download |
30 | Part 13 - Standard II | Download |
31 | Part 14 - Standard III | Download |
32 | Module 3 - Part 01 | Download |
33 | Module 3 - Part 02 | Download |
34 | Module 3 - Part 03 | Download |
35 | Module 3 - Part 04 | Download |
36 | Module 3 - Part 05 | Download |
37 | Module 3 - Part 06 | Download |
38 | Module 3 - Part 07 | Download |
39 | Module 3 - Part 08 | Download |
40 | Module 3 - Part 09 | Download |
41 | Module 4 - Part 01 | Download |
42 | module 4 - Part 02 | Download |
43 | Module 4 - Part 03 | Download |
44 | Module 4 - Part 04 | Download |
45 | Module 4 - Part 05 | Download |
46 | Module 4 - Part 06 | Download |
47 | Module 4 - Part 07 | Download |
48 | Module 4 - Part 08 | Download |
49 | Module 4 - Part 09 | Download |
50 | Module 4 - Part 10 | Download |
51 | Module 5 - Part 01 | Download |
52 | Module 5 - Part 02 | Download |
53 | Module 5 - Part 03 | Download |
54 | Module 5 - Part 04 | Download |
55 | Module 5 - Part 05 | Download |
56 | Module 5 - Part 06 | Download |
57 | Module 5 - Part 07 | Download |
58 | Module 6 - Part 01 | Download |
59 | Module 6 - Part 02 | Download |
60 | Module 6 - Part 03 | Download |
61 | Module 6 - Part 04 | Download |
62 | Module 6 - Part 05 | Download |
63 | Module 6 - Part 06 | Download |
64 | Module 6 - Part 07 | Download |
65 | Module 6 - Part 08 | Download |
Sl.No | Chapter Name | English |
---|---|---|
1 | Part0 - Introduction to the Course | Download Verified |
2 | Part1 - Definition of Information Security | Download Verified |
3 | Part2 - Information Security Terminologies | Download Verified |
4 | Part3 - Goals of Information Security | Download Verified |
5 | Part4 - Implementation Issues of the Goals of Information Security - I | Download Verified |
6 | part5 - Implementation Issues of the Goals of Information Security - II | Download Verified |
7 | Part6 - Control Mechanisms for Information Security - I | Download Verified |
8 | Part 7 - Access Control - Administrative and Technical | Download Verified |
9 | Part 8 - Passwords - Are they secure? - I | Download Verified |
10 | Part 9 - Access Control - Administrative and Technical | Download Verified |
11 | Part 10 - Passwords - Are they secure? - III | Download Verified |
12 | Part 11 - Multifactor Authentication - Challenges | Download Verified |
13 | Part 12 - Application Level Control and Information Security Planning | Download Verified |
14 | Part 13 - Information Security - Policy, Standard and Practice | Download Verified |
15 | Part 14 - Policies governing Issues, Roles and Responsibilities | Download Verified |
16 | Part 15 - Managing changes in Information Security Policies | Download Verified |
17 | Part 16 - Spheres of Information Security | Download Verified |
18 | Part 01 - Protecting your Personal Computer - I | Download Verified |
19 | part 02 - Protecting your Personal Computer - II | Download Verified |
20 | Part 03 - Protecting your Personal Computer - III | Download Verified |
21 | Part 04 - Cloud Computing (Basic Definitions) - I | Download Verified |
22 | Part 05 - Cloud Computing (Deployment) - II | Download Verified |
23 | Part 06 - Cloud Computing (Security Issues) - III | Download Verified |
24 | Part 07 - Cloud Computing (Trust and Risk) - IV | Download Verified |
25 | Part 08 - Cloud Computing (Security and Privacy Issues) - V | Download Verified |
26 | Part 09 - Cloud Computing (Security and Privacy Issues) - VI | Download Verified |
27 | Part 10 - Cloud Computing (Application and Data level security) - VII | Download Verified |
28 | Part 11 - Cloud Computing (Summary) - VIII | Download Verified |
29 | Part 12 - Standard I | Download Verified |
30 | Part 13 - Standard II | Download Verified |
31 | Part 14 - Standard III | Download Verified |
32 | Module 3 - Part 01 | Download Verified |
33 | Module 3 - Part 02 | Download Verified |
34 | Module 3 - Part 03 | Download Verified |
35 | Module 3 - Part 04 | Download Verified |
36 | Module 3 - Part 05 | Download Verified |
37 | Module 3 - Part 06 | Download Verified |
38 | Module 3 - Part 07 | Download Verified |
39 | Module 3 - Part 08 | Download Verified |
40 | Module 3 - Part 09 | Download Verified |
41 | Module 4 - Part 01 | Download Verified |
42 | module 4 - Part 02 | Download Verified |
43 | Module 4 - Part 03 | Download Verified |
44 | Module 4 - Part 04 | Download Verified |
45 | Module 4 - Part 05 | Download Verified |
46 | Module 4 - Part 06 | Download Verified |
47 | Module 4 - Part 07 | Download Verified |
48 | Module 4 - Part 08 | Download Verified |
49 | Module 4 - Part 09 | Download Verified |
50 | Module 4 - Part 10 | Download Verified |
51 | Module 5 - Part 01 | Download Verified |
52 | Module 5 - Part 02 | Download Verified |
53 | Module 5 - Part 03 | Download Verified |
54 | Module 5 - Part 04 | Download Verified |
55 | Module 5 - Part 05 | Download Verified |
56 | Module 5 - Part 06 | Download Verified |
57 | Module 5 - Part 07 | Download Verified |
58 | Module 6 - Part 01 | Download Verified |
59 | Module 6 - Part 02 | Download Verified |
60 | Module 6 - Part 03 | Download Verified |
61 | Module 6 - Part 04 | Download Verified |
62 | Module 6 - Part 05 | Download Verified |
63 | Module 6 - Part 06 | Download Verified |
64 | Module 6 - Part 07 | Download Verified |
65 | Module 6 - Part 08 | Download Verified |
Sl.No | Chapter Name | Hindi |
---|---|---|
1 | Part0 - Introduction to the Course | Download |
2 | Part1 - Definition of Information Security | Download |
3 | Part2 - Information Security Terminologies | Download |
4 | Part3 - Goals of Information Security | Download |
5 | Part4 - Implementation Issues of the Goals of Information Security - I | Download |
6 | part5 - Implementation Issues of the Goals of Information Security - II | Download |
7 | Part6 - Control Mechanisms for Information Security - I | Download |
8 | Part 7 - Access Control - Administrative and Technical | Download |
9 | Part 8 - Passwords - Are they secure? - I | Download |
10 | Part 9 - Access Control - Administrative and Technical | Download |
11 | Part 10 - Passwords - Are they secure? - III | Download |
12 | Part 11 - Multifactor Authentication - Challenges | Download |
13 | Part 12 - Application Level Control and Information Security Planning | Download |
14 | Part 13 - Information Security - Policy, Standard and Practice | Download |
15 | Part 14 - Policies governing Issues, Roles and Responsibilities | Download |
16 | Part 15 - Managing changes in Information Security Policies | Download |
17 | Part 16 - Spheres of Information Security | Download |
18 | Part 01 - Protecting your Personal Computer - I | Download |
19 | part 02 - Protecting your Personal Computer - II | Download |
20 | Part 03 - Protecting your Personal Computer - III | Download |
21 | Part 04 - Cloud Computing (Basic Definitions) - I | Download |
22 | Part 05 - Cloud Computing (Deployment) - II | Download |
23 | Part 06 - Cloud Computing (Security Issues) - III | Download |
24 | Part 07 - Cloud Computing (Trust and Risk) - IV | Download |
25 | Part 08 - Cloud Computing (Security and Privacy Issues) - V | Download |
26 | Part 09 - Cloud Computing (Security and Privacy Issues) - VI | Download |
27 | Part 10 - Cloud Computing (Application and Data level security) - VII | Download |
28 | Part 11 - Cloud Computing (Summary) - VIII | Download |
29 | Part 12 - Standard I | Download |
30 | Part 13 - Standard II | Download |
31 | Part 14 - Standard III | Download |
32 | Module 3 - Part 01 | Download |
33 | Module 3 - Part 02 | Download |
34 | Module 3 - Part 03 | Download |
35 | Module 3 - Part 04 | Download |
36 | Module 3 - Part 05 | Download |
37 | Module 3 - Part 06 | Download |
38 | Module 3 - Part 07 | Download |
39 | Module 3 - Part 08 | Download |
40 | Module 3 - Part 09 | Download |
41 | Module 4 - Part 01 | Download |
42 | module 4 - Part 02 | Download |
43 | Module 4 - Part 03 | Download |
44 | Module 4 - Part 04 | Download |
45 | Module 4 - Part 05 | Download |
46 | Module 4 - Part 06 | Download |
47 | Module 4 - Part 07 | Download |
48 | Module 4 - Part 08 | Download |
49 | Module 4 - Part 09 | Download |
50 | Module 4 - Part 10 | Download |
51 | Module 5 - Part 01 | Download |
52 | Module 5 - Part 02 | Download |
53 | Module 5 - Part 03 | Download |
54 | Module 5 - Part 04 | Download |
55 | Module 5 - Part 05 | Download |
56 | Module 5 - Part 06 | Download |
57 | Module 5 - Part 07 | Download |
58 | Module 6 - Part 01 | Download |
59 | Module 6 - Part 02 | Download |
60 | Module 6 - Part 03 | Download |
61 | Module 6 - Part 04 | Download |
62 | Module 6 - Part 05 | Download |
63 | Module 6 - Part 06 | Download |
64 | Module 6 - Part 07 | Download |
65 | Module 6 - Part 08 | Download |