Company Logo

Lessons

67 lessons • 10h 42m

Lesson 1 - Concept of Controls (in Hindi)

10m 35s

Lesson 2 - Impact of Technology on Controls (in Hindi)

11m 34s

Lesson 3 - Impact of Technology on Controls (Part 2) (in Hindi)

11m 40s

Lesson 4 - Classification of Controls - Preventive Controls (in Hindi)

12m 18s

Lecture 5 - Detective , Corrective and Compensatory Controls (in Hindi)

12m 01s

Lecture 6 - Controls based on Nature of IS Resources (in Hindi)

13m 31s

Lecture 7 - Controls for Environmental Exposures

11m 01s

Lecture 8 - Physical Access Controls - Locks on Doors

8m 31s

Lecture 9 - Physical Access Controls - Part 2

8m 40s

Lecture 10 - Physical Access Controls - Part 3

11m 19s

Lecture 11 - Logical Access Controls - Part 1

10m 34s

Lesson 12 Trojans

8m 47s

Lecture 13 - Trap Doors and Worms

9m 54s

Lecture 14 - Rounding Down and Salami Technique

9m 25s

Lecture 15 - What do you mean by the term Synchronous and Asynchronous Transmission?

10m 01s

Lecture 16 - Asynchronous Attacks - Data Leakage and Subversive Threats

8m 57s

Lecture 17 - Asynchronous Attacks - Wire Tapping and Piggybacking

8m 10s

Lecture 18 - Asynchronous Attacks - Shut down of Computer / Denial of Service (DOS) Attack

10m 54s

Lecture 19 - Logical Access Controls - Introduction and discussion

11m 29s

Lecture 21 - Logical Access Controls - User Responsibilities and Network Access Controls (intro)

10m 31s

Lecture 20 - Logical Access Controls - User Access Management

11m 43s

Lecture 22 - Network Access Control - Enforced Path

8m 53s

Lecture 23 - Firewall

9m 37s

Lecture 24 - Encryption

11m 08s

Lesson 25 - Call Back Devices and Recording of Transaction Logs

9m 13s

Lesson 26 - Operating System Access Controls discussed in brief

10m 24s

Lecture 27- Access Token and Access Control List

9m 02s

Lecture 28 - Discretionary Access Control

8m 58s

Lecture 29 - Application and Monitoring Systems Access Controls (Part 1)

8m 23s

Lecture 30 - Application and Monitoring System Access Controls (Part 2)

9m 39s

Lecture 31 - Controls Based on Audit Functions

8m 35s

Lecture 32 - Types of controls on the basis of Audit Functions Classification

8m 47s

Lecture 33 - Managerial Controls - Top Management and Information Systems

10m 17s

Lecture 34 - Managerial Controls - Systems Development Management

8m 39s

Lecture 35 - Managerial Controls - Programming Management

13m 05s

Lecture 36 - Managerial Controls - Data Resource Management (Part 1)

8m 58s

Lecture 37 - Managerial Controls - Data Resource Management (Part 2)

10m 21s

Lecture 38 - Quality Assurance Management Controls and Security Management Controls

8m 39s

Lecture 39 - Operations Management Controls (Part1)

9m 02s

Lecture 40 - Operarions Management Controls (Part 2)

9m 39s

Lecture 41 - Application controls with an Introductory Conceptual discussion on Boundary Controls

9m 54s

Lecture 42 - Application Controls - Boundary Controls

9m 43s

Lecture 43 - Application Controls - Input Controls (Part 1)

8m 42s

Lecture 44 - Application Controls - Input Controls (Part 2)

8m 27s

Lecture 45 - Input Controls (Part 3)

8m 17s

Lecture 46 - Input Controls - Data Validation Controls (Contd.)

8m 30s

Lecture 47 - Input Controls - Data Validation Controls (Contd.)

8m 35s

Lecture 48 - Processing Controls (Part 1)

8m 38s

Lecture 49 - Processing Controls (Part 2)

8m 26s

Lecture 50 - Processing Controls (Part 3)

8m 33s

Lecture 51 - Processing Controls (Part 4)

8m 55s

Lecture 52 - Output Controls

8m 23s

Lecture 53- Application Controls - Database Controls

8m 53s

Lecture 54 - Application Controls - Communication Controls (Part 1)

8m 13s

Lecture 55 - Application Controls - Communication Controls (Part 2)

8m 08s

Lecture 56 - Application Controls - Communication Controls (Part 3)

8m 25s

Lecture 57 - Application Controls - Communication Controls (Part 4)

8m 37s

Lecture 58 - Application Controls - Communication Controls (Part 5)

9m 00s

Lecture 59 - Application Controls - Communication Controls (Final Part)

8m 57s

Lecture 60 - Controls Over data Integrity and Security - Classification of Information

8m 53s

Lecture 61 - Data Integrity Concept and Controls

8m 40s

Lecture 62 - Data Integrity Policies

9m 11s

Lesson 63 - Data Security- Areas to be reviewd by IS Auditor while reviewing Data Security

9m 01s

Lecture 64 - Financial Controls

9m 06s

Lecture 65 - Personal Computer Controls

8m 58s

Lecture 66 - Concept of Cyber Frauds

9m 20s

Lecture 67 - Cyber Attacks

10m 29s

    COMPANY
  • About us
  • Careers
  • Blogs
  • Privacy Policy
  • Terms and Conditions
EDUCATOR APP
Play Store
App Store
warningNo internet connection