Information Security II. Instructor: Prof. V. Kamakoti, Department of Computer Science and Engineering, IIT Madras.
September 25, 2023
English
English [CC]
Description
Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts. (from nptel.ac.in)
Course Curriculum
-
- Lecture 01 – Need for Secure Systems Unlimited
- Lecture 02 – Ignorance of A is Sin of B Unlimited
- Lecture 03 – Function Calls and Stacks Unlimited
- Lecture 04 – Stack Smashing Unlimited
- Lecture 05 – Virtual Machine based Rootkits Unlimited
-
- Lecture 06 – Security and Architecture: Introduction Unlimited
- Lecture 07 – Structured Computer Organization Completed Unlimited
- Lecture 08 – X86 ISA (Instruction Set Architecture) Unlimited
- Lecture 09 – X86 ISA (cont.) Unlimited
- Lecture 10 – X86 Protected Mode Unlimited
- Lecture 11 – X86 Memory Segmentation Unlimited
- Lecture 12 – Process Isolation using Segmentation Unlimited
- Lecture 13 – Paging and Virtual Memory Unlimited
- Lecture 14 – Task Switching and Interrupt Service Unlimited
- Lecture 19 – Segmentation Recap Unlimited
- Lecture 20 – Interrupt Service Routine Recap Unlimited
- Lecture 21 – Memory Management Recap Unlimited
- Lecture 22 – Task Switch Recap Unlimited
- Lecture 28 – Basics of Networking Unlimited
- Lecture 29 – Network Processor vs General Purpose Processor Unlimited
- Lecture 30 – Network Processor Architecture Unlimited
About the instructor
Instructor Rating
Reviews
Courses
Students
Hours of videos
833 years, 3 months
Units & Quizzes
Unlimited Lifetime access
Access on mobile app
Certificate of Completion
- For teams of 2 or more users
- 27,000+ fresh & in-demand courses
- Learning Engagement tools
- SSO and LMS Integrations