Created by:

Profile Photo

Last updated:

September 25, 2023


Unlimited Duration


This course includes:

Unlimited Duration

Badge on Completion

Certificate of completion

Unlimited Duration


Information Security II. Instructor: Prof. V. Kamakoti, Department of Computer Science and Engineering, IIT Madras.

Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts. (from nptel.ac.in)

Course Curriculum

    • Lecture 01 – Need for Secure Systems Unlimited
    • Lecture 02 – Ignorance of A is Sin of B Unlimited
    • Lecture 03 – Function Calls and Stacks Unlimited
    • Lecture 04 – Stack Smashing Unlimited
    • Lecture 05 – Virtual Machine based Rootkits Unlimited
    • Lecture 06 – Security and Architecture: Introduction Unlimited
    • Lecture 07 – Structured Computer Organization Completed Unlimited
    • Lecture 08 – X86 ISA (Instruction Set Architecture) Unlimited
    • Lecture 09 – X86 ISA (cont.) Unlimited
    • Lecture 10 – X86 Protected Mode Unlimited
    • Lecture 11 – X86 Memory Segmentation Unlimited
    • Lecture 12 – Process Isolation using Segmentation Unlimited
    • Lecture 13 – Paging and Virtual Memory Unlimited
    • Lecture 14 – Task Switching and Interrupt Service Unlimited
    • Lecture 15 – Memory Segmentation Deep Dive: Segment Descriptors Unlimited
    • Lecture 16 – Memory Segmentation Deep Dive: Descriptor Tables Unlimited
    • Lecture 17 – Memory Segmentation Deep Dive: Privilege Checking Unlimited
    • Lecture 18 – Memory Segmentation Deep Dive: Changing Privilege Levels Unlimited
    • Lecture 19 – Segmentation Recap Unlimited
    • Lecture 20 – Interrupt Service Routine Recap Unlimited
    • Lecture 21 – Memory Management Recap Unlimited
    • Lecture 22 – Task Switch Recap Unlimited
    • Lecture 23 – Introduction to Basic Cryptography Unlimited
    • Lecture 24 – Public Key Cryptography Unlimited
    • Lecture 25 – Freescale ARM iMX6 Processor Unlimited
    • Lecture 26 – High Assurance Boot in iMX6 Unlimited
    • Lecture 27 – Case Study Unlimited
    • Lecture 28 – Basics of Networking Unlimited
    • Lecture 29 – Network Processor vs General Purpose Processor Unlimited
    • Lecture 30 – Network Processor Architecture Unlimited

About the instructor

5 5

Instructor Rating







Profile Photo
We are an educational and skills marketplace to accommodate the needs of skills enhancement and free equal education across the globe to the millions. We are bringing courses and trainings every single day for our users. We welcome everyone woth all ages, all background to learn. There is so much available to learn and deliver to the people.