iifl-logo

List of Derivatives Articles

Featured articles

image

The financial lives of every individual has become complex as there are multiple incomes and a number of expenses. Such scenario calls for the need to keep the finances in order so as to avoid challenges in future. Every individual has a unique set of financial goals and challenges, which needs customized personal financial planning.

image

Currency derivatives are positions that obtain their value from the underlying currency.

image

The bear put spread strategy or bear put spread is when an investor sells a put option while simultaneously buying another put option with the same underlying asset and the expiration date.

image

The credit spread Options strategy is a simple yet popular trading strategy. It involves buying and selling Call or Put Options with the same underlying asset and expiration date.

image

If you have opened the Nifty screen on the NSE website, you will find the link to an Option Chain at the top. Of course, this option chain is also available on your trading terminal, but the NSE Nifty option chain is available to everybody on a real-time basis on the website of NSE. Exactly what is Nifty option chain? It is the complete picture […]

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

list of articles

image

The bear put spread strategy or bear put spread is when an investor sells a put option while simultaneously buying another put option with the same underlying asset and the expiration date.

image

Generally, new investors tend to put their money in stocks as they are one of the most sought after and straightforward asset classes.

image

Options trading is a lucrative yet risky investment avenue. The risk, as well as rewards involved in Options, tend to be higher.

image

The credit spread Options strategy is a simple yet popular trading strategy. It involves buying and selling Call or Put Options with the same underlying asset and expiration date.

image

A common belief in the Indian financial market is: the more complex the strategy, the higher is the potential for profits. The same goes with Options trading and its numerous complex strategies.

image

If you have opened the Nifty screen on the NSE website, you will find the link to an Option Chain at the top. Of course, this option chain is also available on your trading terminal, but the NSE Nifty option chain is available to everybody on a real-time basis on the website of NSE. Exactly what is Nifty option chain? It is the complete picture […]

image

To understand settlement of options you need to break up the buy side and the sell side of the option distinctly.

image

An Iron Butterfly Strategy or Iron Fly Strategy is an options trading strategy that combines multiple call and put options to devise a market neutral strategy.

image

What do we understand by the term “Hedge”. The word hedge means protection or covering your risk.

image

Equity investing is a great way to generate returns. However, there can be other rationales for investing in securities like leveraging a position or hedging risk.

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.