Notes
Lecture
Initializing search
ChuzaWick420/notes_publisher/
Notes
ChuzaWick420/notes_publisher/
Read Me
Dev Guide
Feature Showcase
Computer Science
General
Mathematics
Projects
University Notes
University Notes
Semester 1
Semester 2
Semester 3
Semester 4
Semester 5
Semester 5
CS205 Information Security
CS205 Information Security
Week 1
Week 10
Week 11
Week 12
Week 13
Week 14
Week 15
Week 16
Week 2
Week 3
Week 4
Week 5
Week 6
Week 7
Week 7
106. ch03. security hardening of asterisk voip part 2
106. ch03. security hardening of asterisk voip part 2
Lecture
107. ch03. version control for it assets
108. ch03. software version control best practices
109. ch03. security hardening secure software images
110. ch03. manual and automated work in security hardening
111. ch03. qualys demo security hardening
112. ch03. qualys demo security hardening ii
113. ch03. security hardening lifecycle maintaining an integrated and current program
114. ch03. how to security harden it assets for which benchmark or stig is not available
115. ch04. qualys policy libraries
116. ch04. security hardening for outsourced it assets
117. ch04. what is vulnerability management (vm)
118. ch04. what are the steps in a vulnerability management lifecycle
119. ch04. why is software insecure
120. ch04. why is a vulnerability management program required
121. ch04. what is cve, and vulnerability bulletin
122. ch04. what is an exploit
123. ch04. importance of an effective vulnerability management program at stage 2
Week 8
Week 9
CS402 Theory of Automata
CS502 Fundamentals of Algorithms
MCM301 Communication skills
MTH401 Differential Equations
STA301 Statistics and Probability
Semester 6
Lecture
Back to top