Video Lectures

32x32

Chapter 1 : Information Security Overview
Topic : The Importance of Information Protection
Content : explanation 24 MB ,10:56 MIN , THEORY


32x32

Chapter 1 : Information Security Overview
Topic : The Evolution of Information Security
Content : explanation 24 MB ,11:26 MIN , THEORY


32x32

Chapter 1 : Justifying Security Investment
Topic : Justifying Security Investment
Content : explanation 21 MB ,9:41 MIN , THEORY


32x32

Chapter 1 : Information Security Overview
Topic : Security Methodology
Content : explanation 22 MB ,10:2 MIN , THEORY


32x32

Chapter 1 : Information Security Overview
Topic : How to Build a Security Program
Content : explanation 12 MB ,5:41 MIN , THEORY


32x32

Chapter 1 : Information Security Overview
Topic : The Impossible Job, The Weakest Link
Content : explanation 27 MB ,13:36 MIN , THEORY


32x32

Chapter 1 : Information Security Overview
Topic : Strategy and Tactics
Content : explanation 6 MB ,2:57 MIN , THEORY


32x32

Chapter 1 : Information Security Overview
Topic : Business Processes vs. Technical Controls
Content : explanation 8 MB ,4:30 MIN , THEORY


32x32

Chapter 2 : Risk Analysis
Topic : Threat Definition
Content : explanation 66 MB ,32:51 MIN , THEORY


32x32

Chapter 2 : Risk Analysis
Topic : Types of Attacks
Content : explanation 201 MB ,1:39:59 MIN , THEORY


32x32

Chapter 2 : Risk Analysis
Topic : Risk Analysis
Content : explanation 4 MB ,2:15 MIN , THEORY


32x32

Chapter 3 : Secure Design Principles
Topic : The CIA Triad and Other Models
Content : explanation 21 MB ,10:5 MIN , THEORY


32x32

Chapter 3 : Secure Design Principles
Topic : Defense Models
Content : explanation 10 MB ,4:34 MIN , THEORY


32x32

Chapter 3 : Secure Design Principles
Topic : Zones of Trust
Content : explanation 26 MB ,12:40 MIN , THEORY


32x32

Chapter 3 : Secure Design Principles
Topic : Best Practices for Network Defense
Content : explanation 147 MB ,1:4:5 MIN , THEORY


32x32

Chapter 1 : Authentication and Authorization
Topic : Authentication
Content : explanation 208 MB ,1:31:54 MIN , THEORY


32x32

Chapter 1 : Authentication and Authorization
Topic : Authorization
Content : explanation 58 MB ,26:37 MIN , THEORY


32x32

Chapter 2 : Encryption
Topic : A Brief History of Encryption
Content : explanation 26 MB ,12:20 MIN , THEORY


32x32

Chapter 2 : Encryption
Topic : Symmetric-Key Cryptography
Content : explanation 31 MB ,13:19 MIN , THEORY


32x32

Chapter 2 : Encryption
Topic : Public Key Cryptography
Content : explanation 18 MB ,8:24 MIN , THEORY


32x32

Chapter 2 : Encryption
Topic : Public Key Infrastructure
Content : explanation 42 MB ,20:6 MIN , THEORY


32x32

Chapter 3 : Storage Security
Topic : Storage Security Evolution, Modern Storage Security
Content : explanation 133 MB ,1:0:5 MIN , THEORY


32x32

Chapter 3 : Storage Security
Topic : Risk Remediation
Content : explanation 109 MB ,52:27 MIN , THEORY


32x32

Chapter 3 : Storage Security
Topic : Best Practices
Content : explanation 7 MB ,3:5 MIN , THEORY


32x32

Chapter 4 : Database Security
Topic : General Database Security Concepts, Understanding Database Security Layers
Content : explanation 56 MB ,22:24 MIN , THEORY


32x32

Chapter 4 : Database Security
Topic : Understanding Database Level Security
Content : explanation 27 MB ,12:0 MIN , THEORY


32x32

Chapter 4 : Database Security
Topic : Using Application Security
Content : explanation 21 MB ,10:5 MIN , THEORY


32x32

Chapter 4 : Database Security
Topic : Database Backup and Recovery
Content : explanation 21 MB ,9:21 MIN , THEORY


32x32

Chapter 4 : Database Security
Topic : Keeping Your Servers Up to Date, Database Auditing and Monitoring
Content : explanation 14 MB ,6:38 MIN , THEORY


32x32

Chapter 1 : Secure Network Design
Topic : Introduction to Secure Network Design
Content : explanation 23 MB ,9:35 MIN , THEORY


32x32

Chapter 1 : Secure Network Design
Topic : Performance
Content : explanation 19 MB ,9:14 MIN , THEORY


32x32

Chapter 1 : Secure Network Design
Topic : Availability
Content : explanation 14 MB ,6:22 MIN , THEORY


32x32

Chapter 1 : Secure Network Design
Topic : Security
Content : explanation 73 MB ,32:16 MIN , THEORY


32x32

Chapter 2 : Network Device Security
Topic : Switch and Router Basics
Content : explanation 56 MB ,26:47 MIN , THEORY


32x32

Chapter 2 : Network Device Security
Topic : Network Hardening
Content : explanation 76 MB ,32:43 MIN , THEORY


32x32

Chapter 3 : Firewalls
Topic : Overview, The Evolution of Firewalls
Content : explanation 35 MB ,14:41 MIN , THEORY


32x32

Chapter 3 : Firewalls
Topic : Core Firewall Functions
Content : explanation 30 MB ,12:55 MIN , THEORY


32x32

Chapter 3 : Firewalls
Topic : Additional Firewall Capabilities, Firewall Design
Content : explanation 11 MB ,5:28 MIN , THEORY


32x32

Chapter 4 : Wireless Network Security
Topic : Radio Frequency Security Basics
Content : explanation 86 MB ,37:32 MIN , THEORY


32x32

Chapter 4 : Wireless Network Security
Topic : DataLink Layer Wireless Security Features, Flaws, and Threats
Content : explanation 54 MB ,24:11 MIN , THEORY


32x32

Chapter 4 : Wireless Network Security
Topic : Wireless Vulnerabilities and Mitigations
Content : explanation 23 MB ,10:16 MIN , THEORY


32x32

Chapter 4 : Wireless Network Security
Topic : Wireless Network Hardening Practices and Recommendations
Content : explanation 37 MB ,16:44 MIN , THEORY


32x32

Chapter 4 : Wireless Network Security
Topic : Wireless Intrusion Detection and Prevention, Wireless Network Positioning and Secure Gateways
Content : explanation 33 MB ,15:52 MIN , THEORY


32x32

Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Concepts
Content : explanation 112 MB ,54:5 MIN , THEORY


32x32

Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Types and Detection Models
Content : explanation 72 MB ,33:27 MIN , THEORY


32x32

Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Features
Content : explanation 32 MB ,15:41 MIN , THEORY


32x32

Chapter 1 : Intrusion Detection and Prevention Systems
Topic : IDS Deployment Considerations
Content : explanation 26 MB ,13:34 MIN , THEORY


32x32

Chapter 1 : Intrusion Detection and Prevention Systems
Topic : Security Information and Event Management (SIEM)
Content : explanation 31 MB ,13:46 MIN , THEORY


32x32

Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : Background, VoIP Components
Content : explanation 172 MB ,1:19:42 MIN , THEORY


32x32

Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : VoIP Vulnerabilities and Countermeasures
Content : explanation 88 MB ,39:40 MIN , THEORY


32x32

Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : PBX
Content : explanation 19 MB ,9:39 MIN , THEORY


32x32

Chapter 2 : Voice over IP (VoIP) and PBX Security
Topic : TEM: Telecom Expense Management
Content : explanation 3 MB ,1:34 MIN , THEORY


32x32

Chapter 3 : Operating System Security Models
Topic : Operating System Models
Content : explanation 53 MB ,24:13 MIN , THEORY


32x32

Chapter 3 : Operating System Security Models
Topic : Classic Security Models
Content : explanation 28 MB ,13:48 MIN , THEORY


32x32

Chapter 3 : Operating System Security Models
Topic : Reference Monitor
Content : explanation 5 MB ,2:35 MIN , THEORY


32x32

Chapter 3 : Operating System Security Models
Topic : Trustworthy Computing
Content : explanation 15 MB ,7:19 MIN , THEORY


32x32

Chapter 3 : Operating System Security Models
Topic : International Standards for Operating System Security
Content : explanation 16 MB ,6:44 MIN , THEORY


32x32

Chapter 1 : Virtual Machines and Cloud Computing
Topic : Virtual Machines
Content : explanation 121 MB ,49:9 MIN , THEORY


32x32

Chapter 1 : Virtual Machines and Cloud Computing
Topic : Cloud Computing
Content : explanation 130 MB ,1:0:23 MIN , THEORY


32x32

Chapter 2 : Secure Application Design
Topic : Secure Development Lifecycle
Content : explanation 21 MB ,9:49 MIN , THEORY


32x32

Chapter 2 : Secure Application Design
Topic : Application Security Practices
Content : explanation 31 MB ,13:44 MIN , THEORY


32x32

Chapter 2 : Secure Application Design
Topic : Web Application Security
Content : explanation 69 MB ,33:18 MIN , THEORY


32x32

Chapter 2 : Secure Application Design
Topic : Client Application Security, Remote Administration Security
Content : explanation 21 MB ,10:4 MIN , THEORY


32x32

Chapter 3 : Physical Security
Topic : Classification of Assets, Physical Vulnerability Assessment, Choosing Site Location for Security, Securing Assets: Locks and Entry Controls, Physical Intrusion Detection
Content : explanation 29 MB ,12:57 MIN , THEORY


The Shikshak App

The Shikshak App is an honest attempt to provide quality education.

https://play.google.com/store/apps/details?id=com.weit.theshikshak&hl=en_IN