Home » Course Layouts » Free Course Layout Udemy
Information Security II. Instructor: Prof. V. Kamakoti, Department of Computer Science and Engineering, IIT Madras.
0
1
English
English [CC]
- Learn basic syntax that can apply to any language.
- Learn what is a programming language and the basic concepts for beginners.
- Understand what is Javascript in it's truest form.
- Know the basic syntax of Javascript.
- Know some hidden quirks in Javascript.
Description
Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts. (from nptel.ac.in)
Course content
-
- Lecture 01 – Need for Secure Systems Unlimited
- Lecture 02 – Ignorance of A is Sin of B Unlimited
- Lecture 03 – Function Calls and Stacks Unlimited
- Lecture 04 – Stack Smashing Unlimited
- Lecture 05 – Virtual Machine based Rootkits Unlimited
-
- Lecture 06 – Security and Architecture: Introduction Unlimited
- Lecture 07 – Structured Computer Organization Completed Unlimited
- Lecture 08 – X86 ISA (Instruction Set Architecture) Unlimited
- Lecture 09 – X86 ISA (cont.) Unlimited
- Lecture 10 – X86 Protected Mode Unlimited
- Lecture 11 – X86 Memory Segmentation Unlimited
- Lecture 12 – Process Isolation using Segmentation Unlimited
- Lecture 13 – Paging and Virtual Memory Unlimited
- Lecture 14 – Task Switching and Interrupt Service Unlimited
- Lecture 19 – Segmentation Recap Unlimited
- Lecture 20 – Interrupt Service Routine Recap Unlimited
- Lecture 21 – Memory Management Recap Unlimited
- Lecture 22 – Task Switch Recap Unlimited
- Lecture 28 – Basics of Networking Unlimited
- Lecture 29 – Network Processor vs General Purpose Processor Unlimited
- Lecture 30 – Network Processor Architecture Unlimited
N.A
- 5 stars0
- 4 stars0
- 3 stars0
- 2 stars0
- 1 stars0
No Reviews found for this course.