NPTEL : NOC:Introduction to Information Security I (Computer Science and Engineering)

Co-ordinators : Prof. V. Kamakoti


Lecture 1 - Module 1 - Part 0 - Introduction to the Course

Lecture 2 - Module 1 - Part 1 - Definition of Information Security

Lecture 3 - Module 1 - Part 2 - Information Security Terminologies

Lecture 4 - Module 1 - Part 3 - Goals of Information Security

Lecture 5 - Module 1 - Part 4 - Implementation Issues of the Goals of Information Security - I

Lecture 6 - Module 1 - Part 5 - Implementation Issues of the Goals of Information Security - II

Lecture 7 - Module 1 - Part 6 - Control Mechanisms for Information Security - I

Lecture 8 - Module 1 - Part 7 - Access Control - Administrative and Technical

Lecture 9 - Module 1 - Part 8 - Passwords - Are they secure? - I

Lecture 10 - Module 1 - Part 9 - Access Control - Administrative and Technical

Lecture 11 - Module 1 - Part 10 - Passwords - Are they secure? - III

Lecture 12 - Module 1 - Part 11 - Multifactor Authentication - Challenges

Lecture 13 - Module 1 - Part 12 - Application Level Control and Information Security Planning

Lecture 14 - Module 1 - Part 13 - Information Security - Policy, Standard and Practice

Lecture 15 - Module 1 - Part 14 - Policies governing Issues, Roles and Responsibilities

Lecture 16 - Module 1 - Part 15 - Managing changes in Information Security Policies

Lecture 17 - Module 1 - Part 16 - Spheres of Information Security

Lecture 18 - Module 2 - Part 1 - Protecting your Personal Computer - I

Lecture 19 - Module 2 - part 2 - Protecting your Personal Computer - II

Lecture 20 - Module 2 - Part 3 - Protecting your Personal Computer - III

Lecture 21 - Module 2 - Part 4 - Cloud Computing (Basic Definitions) - I

Lecture 22 - Module 2 - Part 5 - Cloud Computing (Deployment) - II

Lecture 23 - Module 2 - Part 6 - Cloud Computing (Security Issues) - III

Lecture 24 - Module 2 - Part 7 - Cloud Computing (Trust and Risk) - IV

Lecture 25 - Module 2 - Part 8 - Cloud Computing (Security and Privacy Issues) - V

Lecture 26 - Module 2 - Part 9 - Cloud Computing (Security and Privacy Issues) - VI

Lecture 27 - Module 2 - Part 10 - Cloud Computing (Application and Data level security) - VII

Lecture 28 - Module 2 - Part 11 - Cloud Computing (Summary) - VIII

Lecture 29 - Module 2 - Part 12 - Standard I

Lecture 30 - Module 2 - Part 13 - Standard II

Lecture 31 - Module 2 - Part 14 - Standard III

Lecture 32 - Module 3 - Part 1

Lecture 33 - Module 3 - Part 2

Lecture 34 - Module 3 - Part 3

Lecture 35 - Module 3 - Part 4

Lecture 36 - Module 3 - Part 5

Lecture 37 - Module 3 - Part 6

Lecture 38 - Module 3 - Part 7

Lecture 39 - Module 3 - Part 8

Lecture 40 - Module 3 - Part 9

Lecture 41 - Module 4 - Part 1

Lecture 42 - module 4 - Part 2

Lecture 43 - Module 4 - Part 3

Lecture 44 - Module 4 - Part 4

Lecture 45 - Module 4 - Part 5

Lecture 46 - Module 4 - Part 6

Lecture 47 - Module 4 - Part 7

Lecture 48 - Module 4 - Part 8

Lecture 49 - Module 4 - Part 9

Lecture 50 - Module 4 - Part 10

Lecture 51 - Module 5 - Part 1

Lecture 52 - Module 5 - Part 2

Lecture 53 - Module 5 - Part 3

Lecture 54 - Module 5 - Part 4

Lecture 55 - Module 5 - Part 5

Lecture 56 - Module 5 - Part 6

Lecture 57 - Module 5 - Part 7

Lecture 58 - Module 6 - Part 1

Lecture 59 - Module 6 - Part 2

Lecture 60 - Module 6 - Part 3

Lecture 61 - Module 6 - Part 4

Lecture 62 - Module 6 - Part 5

Lecture 63 - Module 6 - Part 6

Lecture 64 - Module 6 - Part 7

Lecture 65 - Module 6 - Part 8