Lesson 30 of 67 • 38 upvotes • 9:39mins
67 lessons • 10h 42m
Lesson 1 - Concept of Controls (in Hindi)
10:35mins
Lesson 2 - Impact of Technology on Controls (in Hindi)
11:34mins
Lesson 3 - Impact of Technology on Controls (Part 2) (in Hindi)
11:40mins
Lesson 4 - Classification of Controls - Preventive Controls (in Hindi)
12:18mins
Lecture 5 - Detective , Corrective and Compensatory Controls (in Hindi)
12:01mins
Lecture 6 - Controls based on Nature of IS Resources (in Hindi)
13:31mins
Lecture 7 - Controls for Environmental Exposures
11:01mins
Lecture 8 - Physical Access Controls - Locks on Doors
8:31mins
Lecture 9 - Physical Access Controls - Part 2
8:40mins
Lecture 10 - Physical Access Controls - Part 3
11:19mins
Lecture 11 - Logical Access Controls - Part 1
10:34mins
Lesson 12 Trojans
8:47mins
Lecture 13 - Trap Doors and Worms
9:54mins
Lecture 14 - Rounding Down and Salami Technique
9:25mins
Lecture 15 - What do you mean by the term Synchronous and Asynchronous Transmission?
10:01mins
Lecture 16 - Asynchronous Attacks - Data Leakage and Subversive Threats
8:57mins
Lecture 17 - Asynchronous Attacks - Wire Tapping and Piggybacking
8:10mins
Lecture 18 - Asynchronous Attacks - Shut down of Computer / Denial of Service (DOS) Attack
10:54mins
Lecture 19 - Logical Access Controls - Introduction and discussion
11:29mins
Lecture 21 - Logical Access Controls - User Responsibilities and Network Access Controls (intro)
10:31mins
Lecture 20 - Logical Access Controls - User Access Management
11:43mins
Lecture 22 - Network Access Control - Enforced Path
8:53mins
Lecture 23 - Firewall
9:37mins
Lecture 24 - Encryption
11:08mins
Lesson 25 - Call Back Devices and Recording of Transaction Logs
9:13mins
Lesson 26 - Operating System Access Controls discussed in brief
10:24mins
Lecture 27- Access Token and Access Control List
9:02mins
Lecture 28 - Discretionary Access Control
8:58mins
Lecture 29 - Application and Monitoring Systems Access Controls (Part 1)
8:23mins
Lecture 30 - Application and Monitoring System Access Controls (Part 2)
9:39mins
Lecture 31 - Controls Based on Audit Functions
8:35mins
Lecture 32 - Types of controls on the basis of Audit Functions Classification
8:47mins
Lecture 33 - Managerial Controls - Top Management and Information Systems
10:17mins
Lecture 34 - Managerial Controls - Systems Development Management
8:39mins
Lecture 35 - Managerial Controls - Programming Management
13:05mins
Lecture 36 - Managerial Controls - Data Resource Management (Part 1)
8:58mins
Lecture 37 - Managerial Controls - Data Resource Management (Part 2)
10:21mins
Lecture 38 - Quality Assurance Management Controls and Security Management Controls
8:39mins
Lecture 39 - Operations Management Controls (Part1)
9:02mins
Lecture 40 - Operarions Management Controls (Part 2)
9:39mins
Lecture 41 - Application controls with an Introductory Conceptual discussion on Boundary Controls
9:54mins
Lecture 42 - Application Controls - Boundary Controls
9:43mins
Lecture 43 - Application Controls - Input Controls (Part 1)
8:42mins
Lecture 44 - Application Controls - Input Controls (Part 2)
8:27mins
Lecture 45 - Input Controls (Part 3)
8:17mins
Lecture 46 - Input Controls - Data Validation Controls (Contd.)
8:30mins
Lecture 47 - Input Controls - Data Validation Controls (Contd.)
8:35mins
Lecture 48 - Processing Controls (Part 1)
8:38mins
Lecture 49 - Processing Controls (Part 2)
8:26mins
Lecture 50 - Processing Controls (Part 3)
8:33mins
Lecture 51 - Processing Controls (Part 4)
8:55mins
Lecture 52 - Output Controls
8:23mins
Lecture 53- Application Controls - Database Controls
8:53mins
Lecture 54 - Application Controls - Communication Controls (Part 1)
8:13mins
Lecture 55 - Application Controls - Communication Controls (Part 2)
8:08mins
Lecture 56 - Application Controls - Communication Controls (Part 3)
8:25mins
Lecture 57 - Application Controls - Communication Controls (Part 4)
8:37mins
Lecture 58 - Application Controls - Communication Controls (Part 5)
9:00mins
Lecture 59 - Application Controls - Communication Controls (Final Part)
8:57mins
Lecture 60 - Controls Over data Integrity and Security - Classification of Information
8:53mins
Lecture 61 - Data Integrity Concept and Controls
8:40mins
Lecture 62 - Data Integrity Policies
9:11mins
Lesson 63 - Data Security- Areas to be reviewd by IS Auditor while reviewing Data Security
9:01mins
Lecture 64 - Financial Controls
9:06mins
Lecture 65 - Personal Computer Controls
8:58mins
Lecture 66 - Concept of Cyber Frauds
9:20mins
Lecture 67 - Cyber Attacks
10:29mins