Video Lectures

32x32

Chapter 1 : Information Security Overview
Topic : The Importance of Information Protection, The Evolution of Information Security, Justifying Security investment, Security Methodology, How to Build a Security Program, The Impossible Job, The Weakest Link, Strategy and Tactics, Business Processes vs. Technical Controls.
Content : The Importance of Information Protection, The Evolution of Information Security, Justifying Security investment, Business Agility, Cost Reduction, Portability, Security Methodology, How to Build a Security Program, Components of building to a security program, The Impossible Job, Security Truth, The Weakest Link, Strategy and Tactics, Security strategy and Security Tactics, Business Processes vs. Technical Controls. 46 MB ,29:9 MIN , THEORY


32x32

Chapter 2 : Risk Analysis
Topic : Threat Definition, Types of Attacks, Risk Analysis
Content : Threat, Threat Vector & Impact, Types of Attacks, Active Attacks, Passive Attacks, Viruses, Worms, Trojan Horse, DDOS attack, Man in the Middle Attack, Risk Analysis Process 64 MB ,40:14 MIN , THEORY


32x32

Chapter 2 : Risk Analysis
Topic : Anatomy of Virus
Content : Payload, Non-resident virus, Memory Resident virus, Overwriting Virus, parasitic virus, Prepending Virus, Appending Virus, Mid-infecting virus 14 MB ,9:8 MIN , THEORY


32x32

Chapter 3 : Secure Design Principles
Topic : The CIA Triad and Other Models, Defense Models, Zones of Trust, Best Practices for Network Defense
Content : The CIA Triad, Confidentiality, Integrity, Availability, Approaches to Achieve CIA, Defense Models, Zones of Trust,Trust Levels, Best Practices for Network Defense, Secure the Network Environment 37 MB ,22:10 MIN , THEORY


32x32

Chapter 1 : Authentication and Authorization
Topic : Authentication, Authorization
Content : Authentication, Usernames and Passwords, Certificate-Based Authentication, Biometrics, Authorization, User Rights, Role Based Authorization 26 MB ,16:17 MIN , THEORY


32x32

Chapter 2 : Encryption
Topic : A Brief History of Encryption, Symmetric-Key Encryption, Public Key Cryptography, Public Key Infrastructure
Content : A Brief History of Encryption, Cryptography, Transposition Cipher & Substitution Cipher, Working of Symmetric-Key Encryption, Types of Symmetric Key Encryption, Working of Public Key Cryptography, Public Key Infrastructure 41 MB ,25:12 MIN , THEORY


32x32

Chapter 3 : Storage Security
Topic : Storage Security Evolution, Modern Storage Security, Risk Remediation
Content : Storage Security Evolution, Modern Storage Security, NAS & SAN, Storage Infrastructure,Storage Networks, Arrays, Servers, Risk to data, Risk, Risk Relation, Risk Remediation, Confidentiality Risk, Integrity Risk, Availability Risk 74 MB ,44:50 MIN , THEORY


32x32

Chapter 4 : Database Security
Topic : General Database Security Concepts, Understanding Database Security Layers, Understanding Database Level Security, Using Application Security, Database Backup and recovery, Keeping Your Servers Up to Date, Database Auditing and Monitoring
Content : General Database Security Concepts, Understanding Database Security Layers, Server level Security, Network Level Security, Operating System Security, Understanding Database Level Security, Database Administration Security, Using Application Security, Limitations of Application Level Security, Database Backup and recovery, Need of Backup, Determining Backup Constraints, Types of Data Backups, Determining Recovery Requirements, Keeping Your Servers Up to Date, Database Auditing and Monitoring, Reviewing Audit Logs, Database Monitoring 97 MB ,58:29 MIN , THEORY


32x32

Chapter 1 : Secure Network Design
Topic : Introduction to Secure Network Design, Performance, Availability, Security.
Content : Introduction to Secure Network Design, Acceptable Risk, Designing Security into a Network, Designing an Appropriate Network, The Cost of Security, Performance, Availability, Security 58 MB ,36:20 MIN , THEORY


32x32

Chapter 2 : Network Device Security
Topic : Switch and Router Basics, Network Hardening
Content : Need of Network Device Security, Switch and Router Basics, MAC Addresses, IP Addresses, and ARP, TCP/IP, Network Hardening, Steps to avoid Network Hardening 43 MB ,26:54 MIN , THEORY


32x32

Chapter 3 : Firewalls
Topic : Overview, The Evolution of Firewalls, Core Firewall Functions, Additional Firewall Capabilities, Firewall Design.
Content : Overview, The Evolution of Firewalls, Core Firewall Functions, NAT, Types of NAT, Auditing and Logging, Additional Firewall Capabilities, Firewall Design, Firewall Strength and Weaknesses, Firewall Configuration. 61 MB ,37:53 MIN , THEORY


32x32

Chapter 4 : Wireless Network Security
Topic : Wireless Network Security, Radio Frequency Security Basics Data Link Layer Wireless Security Features Flaws, and Threats, Wireless Vulnerabilities and Mitigations, Wireless Network Hardening Practices and Recommendations, Wireless Intrusion Detection and Prevention, Wireless Network Positioning and Secure Gateways
Content : Radio Frequency Security Basics, Layer One Security Solutions, Importance of Antenna Choice and Positioning, Types of Antennas, Controlling the Range of Your Wireless Devices, Spread Spectrum Wireless networks, Data Link Layer Wireless Security Features, Flaws, and Threats, Wireless Vulnerabilities and Mitigations, Wireless Network Hardening Practices and Recommendations, Wireless Intrusion Detection and Prevention, IDS, IPS, Wireless Network Positioning and Secure Gateways. 72 MB ,44:26 MIN , THEORY


32x32

Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Concepts, IDS Types and Detection Models, IDS Features, IDS Deployment Considerations Security Information and Event Management (SIEM).
Content : IDS Concepts, IDS Types and Detection Models, Generation of IDS, IDS Types, Detection Models, IDS Features, IDS Deployment Considerations, IPS Deployment Plan, Comparison IPS & IDS, Security Information and Event Management (SIEM) Tool. 77 MB ,47:55 MIN , THEORY


32x32

Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : Voice over IP (VoIP) and PBX Security, Background, VoIP Components, VoIP Vulnerabilities and Countermeasures, PBX, TEM: Telecom Expense Management.
Content : Voice over IP (VoIP) and PBX Security, Background,Components of a modern enterprise IP-based phone or video system, Classes, VoIP Components, VoIP Vulnerabilities and Countermeasures, Protocols, PBX, PBX Features, Hacking PBX, Securing PBX, TEM: Telecom Expense Management. 53 MB ,33:30 MIN , THEORY


32x32

Chapter 3 : Operating System Security Models
Topic : Operating System Security Models, Operating System Models, Classic Security Models Reference Monitor, Trustworthy Computing, International Standards for Operating System Security.
Content : Operating System Security Models, Operating System Models, The Underlying Protocols Are Insecure, Access Control List, MAC vs DAC, Classic Security Models, Bell-LaPadula, Biba, Clarke Wilson Security, Reference Monitor, The Reference Monitor Concept, Trustworthy Computing and Goals, International Standards for Operating System Security. 61 MB ,37:33 MIN , THEORY


32x32

Chapter 1 : Virtual Machines and Cloud Computing
Topic : Virtual Machines, Cloud Computing
Content : Virtual Machine, Hypervisor, Protecting the hypervisor, Protecting the Guest OS, Protecting the Virtual Network, Cloud Computing Definition, Types of Deployment Models, Types of Cloud Services, Cloud Computing Security Benefits, Cloud Computing Risks and Remediations, Cloud Security Technologies 52 MB ,33:32 MIN , THEORY


32x32

Chapter 2 : Secure Application Design
Topic : Secure Development Lifecycle, Application Security Practices, Client Application Security, Remote Administration Security
Content : Secure Development Lifecycle, Application Security Practices, Security Training, Secure Development Infrastructure, Security Requirements, Secure Design, Threat modelling, Secure Coding, Security testing, Security Documentation, Client Application Security, running Privileges, Application administration, Integration with OS security, Application updates, Remote Administration Security, Reason for Remote administration, Remote administration using Web Interface, Authentication Web based Remote Administration, Custom Remote Administration 62 MB ,39:24 MIN , THEORY


32x32

Chapter 3 : Physical Security
Topic : Classification of Assets, Physical Vulnerability Assessment, Choosing Site Location for Security, Securing Assets: Locks and Entry Controls, Physical Intrusion Detection.
Content : Classification of Assets, Physical Vulnerability Assessment, Choosing Site Location for Security, Securing Assets: Locks and Entry Controls, Physical Intrusion Detection, Closed Circuit Television, Alarms, Mantraps, System Logs 33 MB ,21:20 MIN , THEORY


The Shikshak App

The Shikshak App is an honest attempt to provide quality education.

https://play.google.com/store/apps/details?id=com.weit.theshikshak&hl=en_IN