Lecture 1 - Module 1 - Part 0 - Introduction to the Course
Lecture 2 - Module 1 - Part 1 - Definition of Information Security
Lecture 3 - Module 1 - Part 2 - Information Security Terminologies
Lecture 4 - Module 1 - Part 3 - Goals of Information Security
Lecture 5 - Module 1 - Part 4 - Implementation Issues of the Goals of Information Security - I
Lecture 6 - Module 1 - Part 5 - Implementation Issues of the Goals of Information Security - II
Lecture 7 - Module 1 - Part 6 - Control Mechanisms for Information Security - I
Lecture 8 - Module 1 - Part 7 - Access Control - Administrative and Technical
Lecture 9 - Module 1 - Part 8 - Passwords - Are they secure? - I
Lecture 10 - Module 1 - Part 9 - Access Control - Administrative and Technical
Lecture 11 - Module 1 - Part 10 - Passwords - Are they secure? - III
Lecture 12 - Module 1 - Part 11 - Multifactor Authentication - Challenges
Lecture 13 - Module 1 - Part 12 - Application Level Control and Information Security Planning
Lecture 14 - Module 1 - Part 13 - Information Security - Policy, Standard and Practice
Lecture 15 - Module 1 - Part 14 - Policies governing Issues, Roles and Responsibilities
Lecture 16 - Module 1 - Part 15 - Managing changes in Information Security Policies
Lecture 17 - Module 1 - Part 16 - Spheres of Information Security
Lecture 18 - Module 2 - Part 1 - Protecting your Personal Computer - I
Lecture 19 - Module 2 - part 2 - Protecting your Personal Computer - II
Lecture 20 - Module 2 - Part 3 - Protecting your Personal Computer - III
Lecture 21 - Module 2 - Part 4 - Cloud Computing (Basic Definitions) - I
Lecture 22 - Module 2 - Part 5 - Cloud Computing (Deployment) - II
Lecture 23 - Module 2 - Part 6 - Cloud Computing (Security Issues) - III
Lecture 24 - Module 2 - Part 7 - Cloud Computing (Trust and Risk) - IV
Lecture 25 - Module 2 - Part 8 - Cloud Computing (Security and Privacy Issues) - V
Lecture 26 - Module 2 - Part 9 - Cloud Computing (Security and Privacy Issues) - VI
Lecture 27 - Module 2 - Part 10 - Cloud Computing (Application and Data level security) - VII
Lecture 28 - Module 2 - Part 11 - Cloud Computing (Summary) - VIII
Lecture 29 - Module 2 - Part 12 - Standard I
Lecture 30 - Module 2 - Part 13 - Standard II
Lecture 31 - Module 2 - Part 14 - Standard III
Lecture 32 - Module 3 - Part 1
Lecture 33 - Module 3 - Part 2
Lecture 34 - Module 3 - Part 3
Lecture 35 - Module 3 - Part 4
Lecture 36 - Module 3 - Part 5
Lecture 37 - Module 3 - Part 6
Lecture 38 - Module 3 - Part 7
Lecture 39 - Module 3 - Part 8
Lecture 40 - Module 3 - Part 9
Lecture 41 - Module 4 - Part 1
Lecture 42 - module 4 - Part 2
Lecture 43 - Module 4 - Part 3
Lecture 44 - Module 4 - Part 4
Lecture 45 - Module 4 - Part 5
Lecture 46 - Module 4 - Part 6
Lecture 47 - Module 4 - Part 7
Lecture 48 - Module 4 - Part 8
Lecture 49 - Module 4 - Part 9
Lecture 50 - Module 4 - Part 10
Lecture 51 - Module 5 - Part 1
Lecture 52 - Module 5 - Part 2
Lecture 53 - Module 5 - Part 3
Lecture 54 - Module 5 - Part 4
Lecture 55 - Module 5 - Part 5
Lecture 56 - Module 5 - Part 6
Lecture 57 - Module 5 - Part 7
Lecture 58 - Module 6 - Part 1
Lecture 59 - Module 6 - Part 2
Lecture 60 - Module 6 - Part 3
Lecture 61 - Module 6 - Part 4
Lecture 62 - Module 6 - Part 5
Lecture 63 - Module 6 - Part 6
Lecture 64 - Module 6 - Part 7
Lecture 65 - Module 6 - Part 8