Watch :3
Information Security
33 videos • 150,117 views • by A Z Computing
In this playlist you will find the videos about all the important topics related to information security subject. All topics has been explained with help of a simple examples.
1
What is Information Security || Introduction to Information Security Tutorial in urdu/hindi
A Z Computing
Download
2
CIA Triad Information Security in urdu/hindi
A Z Computing
Download
3
Impact Levels in Information Security || What if Security Fails?
A Z Computing
Download
4
Information Security Challenges
A Z Computing
Download
5
What is Encryption? Basic Encryption Terminologies with Examples
A Z Computing
Download
6
Substitution Cipher | Transposition Cipher | Product Cipher With Examples
A Z Computing
Download
7
ROT13 Encryption Technique Algorithm || ROT13 Cryptography Cipher with Example
A Z Computing
Download
8
Rail Fence Cipher Technique with Example
A Z Computing
Download
9
Types of Encryption | Symmetric Key and Asymmetric Key Encryption
A Z Computing
Download
10
Stream Cipher vs Block Cipher
A Z Computing
Download
11
Caesar Cipher Encryption and Decryption with Solved Example || Substitution Technique
A Z Computing
Download
12
Vigenere Cipher with Solved Example | Part 1 Encryption
A Z Computing
Download
13
Vigenere Cipher with Solved Example | Part 2 Decryption
A Z Computing
Download
14
Playfair Cipher Encryption and Decryption with Example in Urdu/Hindi
A Z Computing
Download
15
Types of Attacks in Network Security/Information Security || What is Active and Passive Attack?
A Z Computing
Download
16
Passive Attacks in Network Security || Traffic Analysis Attack
A Z Computing
Download
17
Active Attack and its Types in Network Security
A Z Computing
Download
18
OSI Security Architecture X.800 in Network Security || Security Services
A Z Computing
Download
19
OSI Security Architecture X.800 || Specific Security Mechanism
A Z Computing
Download
20
OSI Security Architecture X.800 || Pervasive Security Mechanisms
A Z Computing
Download
21
What is Security Policy in Information Security || Cisco Security Wheel
A Z Computing
Download
22
Good Security Policy || Attributes of Good Security Policy
A Z Computing
Download
23
Network Security Model in Information Security
A Z Computing
Download
24
Intrusion Detection System (IDS) in Information Security/Network Security
A Z Computing
Download
25
Network Intrusion Detection System || Host Intrusion Detection System
A Z Computing
Download
26
Signature Based IDS || Anomaly Based IDS
A Z Computing
Download
27
What is Firewall in Computer Security/Cyber Security/Network Security
A Z Computing
Download
28
Types of Firewall || Packet Filtering Firewall
A Z Computing
Download
29
Proxy Firewall
A Z Computing
Download
30
Kerberos - Authentication Protocol || Network Authentication protocol
A Z Computing
Download
31
RSA Algorithm in Network Security with Solved Example
A Z Computing
Download
32
Diffie Hellman Key Exchange Algorithm with Example
A Z Computing
Download
33
Encryption Basics Explained | InfoSec 101 for Beginners
A Z Computing
Download