Modules / Lectures

Video Transcript:

Auto Scroll Hide


New Assignments
Module NameDownload
Module1Module1
Module2Module2
Module3Module3
Module4Module4
Module5Module5
Module6Module6


Sl.No Chapter Name MP4 Download
1Part0 - Introduction to the CourseDownload
2Part1 - Definition of Information SecurityDownload
3Part2 - Information Security TerminologiesDownload
4Part3 - Goals of Information SecurityDownload
5Part4 - Implementation Issues of the Goals of Information Security - IDownload
6part5 - Implementation Issues of the Goals of Information Security - IIDownload
7Part6 - Control Mechanisms for Information Security - IDownload
8Part 7 - Access Control - Administrative and TechnicalDownload
9Part 8 - Passwords - Are they secure? - IDownload
10Part 9 - Access Control - Administrative and TechnicalDownload
11Part 10 - Passwords - Are they secure? - IIIDownload
12Part 11 - Multifactor Authentication - ChallengesDownload
13Part 12 - Application Level Control and Information Security PlanningDownload
14Part 13 - Information Security - Policy, Standard and PracticeDownload
15Part 14 - Policies governing Issues, Roles and ResponsibilitiesDownload
16Part 15 - Managing changes in Information Security PoliciesDownload
17Part 16 - Spheres of Information SecurityDownload
18Part 01 - Protecting your Personal Computer - IDownload
19part 02 - Protecting your Personal Computer - IIDownload
20Part 03 - Protecting your Personal Computer - IIIDownload
21Part 04 - Cloud Computing (Basic Definitions) - IDownload
22Part 05 - Cloud Computing (Deployment) - IIDownload
23Part 06 - Cloud Computing (Security Issues) - IIIDownload
24Part 07 - Cloud Computing (Trust and Risk) - IVDownload
25Part 08 - Cloud Computing (Security and Privacy Issues) - VDownload
26Part 09 - Cloud Computing (Security and Privacy Issues) - VIDownload
27Part 10 - Cloud Computing (Application and Data level security) - VIIDownload
28Part 11 - Cloud Computing (Summary) - VIIIDownload
29Part 12 - Standard IDownload
30Part 13 - Standard IIDownload
31Part 14 - Standard IIIDownload
32Module 3 - Part 01Download
33Module 3 - Part 02Download
34Module 3 - Part 03Download
35Module 3 - Part 04Download
36Module 3 - Part 05Download
37Module 3 - Part 06Download
38Module 3 - Part 07Download
39Module 3 - Part 08Download
40Module 3 - Part 09Download
41Module 4 - Part 01Download
42module 4 - Part 02Download
43Module 4 - Part 03Download
44Module 4 - Part 04Download
45Module 4 - Part 05Download
46Module 4 - Part 06Download
47Module 4 - Part 07Download
48Module 4 - Part 08Download
49Module 4 - Part 09Download
50Module 4 - Part 10Download
51Module 5 - Part 01Download
52Module 5 - Part 02Download
53Module 5 - Part 03Download
54Module 5 - Part 04Download
55Module 5 - Part 05Download
56Module 5 - Part 06Download
57Module 5 - Part 07Download
58Module 6 - Part 01Download
59Module 6 - Part 02Download
60Module 6 - Part 03Download
61Module 6 - Part 04Download
62Module 6 - Part 05Download
63Module 6 - Part 06Download
64Module 6 - Part 07Download
65Module 6 - Part 08Download

Sl.No Chapter Name English
1Part0 - Introduction to the CourseDownload
Verified
2Part1 - Definition of Information SecurityDownload
Verified
3Part2 - Information Security TerminologiesDownload
Verified
4Part3 - Goals of Information SecurityDownload
Verified
5Part4 - Implementation Issues of the Goals of Information Security - IDownload
Verified
6part5 - Implementation Issues of the Goals of Information Security - IIDownload
Verified
7Part6 - Control Mechanisms for Information Security - IDownload
Verified
8Part 7 - Access Control - Administrative and TechnicalDownload
Verified
9Part 8 - Passwords - Are they secure? - IDownload
Verified
10Part 9 - Access Control - Administrative and TechnicalDownload
Verified
11Part 10 - Passwords - Are they secure? - IIIDownload
Verified
12Part 11 - Multifactor Authentication - ChallengesDownload
Verified
13Part 12 - Application Level Control and Information Security PlanningDownload
Verified
14Part 13 - Information Security - Policy, Standard and PracticeDownload
Verified
15Part 14 - Policies governing Issues, Roles and ResponsibilitiesDownload
Verified
16Part 15 - Managing changes in Information Security PoliciesDownload
Verified
17Part 16 - Spheres of Information SecurityDownload
Verified
18Part 01 - Protecting your Personal Computer - IDownload
Verified
19part 02 - Protecting your Personal Computer - IIDownload
Verified
20Part 03 - Protecting your Personal Computer - IIIDownload
Verified
21Part 04 - Cloud Computing (Basic Definitions) - IDownload
Verified
22Part 05 - Cloud Computing (Deployment) - IIDownload
Verified
23Part 06 - Cloud Computing (Security Issues) - IIIDownload
Verified
24Part 07 - Cloud Computing (Trust and Risk) - IVDownload
Verified
25Part 08 - Cloud Computing (Security and Privacy Issues) - VDownload
Verified
26Part 09 - Cloud Computing (Security and Privacy Issues) - VIDownload
Verified
27Part 10 - Cloud Computing (Application and Data level security) - VIIDownload
Verified
28Part 11 - Cloud Computing (Summary) - VIIIDownload
Verified
29Part 12 - Standard IDownload
Verified
30Part 13 - Standard IIDownload
Verified
31Part 14 - Standard IIIDownload
Verified
32Module 3 - Part 01Download
Verified
33Module 3 - Part 02Download
Verified
34Module 3 - Part 03Download
Verified
35Module 3 - Part 04Download
Verified
36Module 3 - Part 05Download
Verified
37Module 3 - Part 06Download
Verified
38Module 3 - Part 07Download
Verified
39Module 3 - Part 08Download
Verified
40Module 3 - Part 09Download
Verified
41Module 4 - Part 01Download
Verified
42module 4 - Part 02Download
Verified
43Module 4 - Part 03Download
Verified
44Module 4 - Part 04Download
Verified
45Module 4 - Part 05Download
Verified
46Module 4 - Part 06Download
Verified
47Module 4 - Part 07Download
Verified
48Module 4 - Part 08Download
Verified
49Module 4 - Part 09Download
Verified
50Module 4 - Part 10Download
Verified
51Module 5 - Part 01Download
Verified
52Module 5 - Part 02Download
Verified
53Module 5 - Part 03Download
Verified
54Module 5 - Part 04Download
Verified
55Module 5 - Part 05Download
Verified
56Module 5 - Part 06Download
Verified
57Module 5 - Part 07Download
Verified
58Module 6 - Part 01Download
Verified
59Module 6 - Part 02Download
Verified
60Module 6 - Part 03Download
Verified
61Module 6 - Part 04Download
Verified
62Module 6 - Part 05Download
Verified
63Module 6 - Part 06Download
Verified
64Module 6 - Part 07Download
Verified
65Module 6 - Part 08Download
Verified
Sl.No Chapter Name Hindi
1Part0 - Introduction to the CourseDownload
2Part1 - Definition of Information SecurityDownload
3Part2 - Information Security TerminologiesDownload
4Part3 - Goals of Information SecurityDownload
5Part4 - Implementation Issues of the Goals of Information Security - IDownload
6part5 - Implementation Issues of the Goals of Information Security - IIDownload
7Part6 - Control Mechanisms for Information Security - IDownload
8Part 7 - Access Control - Administrative and TechnicalDownload
9Part 8 - Passwords - Are they secure? - IDownload
10Part 9 - Access Control - Administrative and TechnicalDownload
11Part 10 - Passwords - Are they secure? - IIIDownload
12Part 11 - Multifactor Authentication - ChallengesDownload
13Part 12 - Application Level Control and Information Security PlanningDownload
14Part 13 - Information Security - Policy, Standard and PracticeDownload
15Part 14 - Policies governing Issues, Roles and ResponsibilitiesDownload
16Part 15 - Managing changes in Information Security PoliciesDownload
17Part 16 - Spheres of Information SecurityDownload
18Part 01 - Protecting your Personal Computer - IDownload
19part 02 - Protecting your Personal Computer - IIDownload
20Part 03 - Protecting your Personal Computer - IIIDownload
21Part 04 - Cloud Computing (Basic Definitions) - IDownload
22Part 05 - Cloud Computing (Deployment) - IIDownload
23Part 06 - Cloud Computing (Security Issues) - IIIDownload
24Part 07 - Cloud Computing (Trust and Risk) - IVDownload
25Part 08 - Cloud Computing (Security and Privacy Issues) - VDownload
26Part 09 - Cloud Computing (Security and Privacy Issues) - VIDownload
27Part 10 - Cloud Computing (Application and Data level security) - VIIDownload
28Part 11 - Cloud Computing (Summary) - VIIIDownload
29Part 12 - Standard IDownload
30Part 13 - Standard IIDownload
31Part 14 - Standard IIIDownload
32Module 3 - Part 01Download
33Module 3 - Part 02Download
34Module 3 - Part 03Download
35Module 3 - Part 04Download
36Module 3 - Part 05Download
37Module 3 - Part 06Download
38Module 3 - Part 07Download
39Module 3 - Part 08Download
40Module 3 - Part 09Download
41Module 4 - Part 01Download
42module 4 - Part 02Download
43Module 4 - Part 03Download
44Module 4 - Part 04Download
45Module 4 - Part 05Download
46Module 4 - Part 06Download
47Module 4 - Part 07Download
48Module 4 - Part 08Download
49Module 4 - Part 09Download
50Module 4 - Part 10Download
51Module 5 - Part 01Download
52Module 5 - Part 02Download
53Module 5 - Part 03Download
54Module 5 - Part 04Download
55Module 5 - Part 05Download
56Module 5 - Part 06Download
57Module 5 - Part 07Download
58Module 6 - Part 01Download
59Module 6 - Part 02Download
60Module 6 - Part 03Download
61Module 6 - Part 04Download
62Module 6 - Part 05Download
63Module 6 - Part 06Download
64Module 6 - Part 07Download
65Module 6 - Part 08Download


Sl.No Language Book link
1EnglishDownload
2BengaliNot Available
3GujaratiNot Available
4HindiDownload
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available