NPTEL : NOC:Information Security-3 (Computer Science and Engineering)

Co-ordinators : Prof. V. Kamakoti


Lecture 1 - Operating System Introduction

Lecture 2 - Storage Hierarchy, Exceptions, Interrupts and traps

Lecture 3 - OS Management Services

Lecture 4 - OS Security Issues

Lecture 5 - Process and Threads

Lecture 6 - Process Scheduling

Lecture 7 - Scheduling Algorithm

Lecture 8 - Process Synchronization

Lecture 9 - Memory Management - 1

Lecture 10 - Memory Management - 2

Lecture 11 - File Systems - 1

Lecture 12 - File Systems - 2

Lecture 13 - Unix Filesystem

Lecture 14 - Unix Filesystem (Continued...)

Lecture 15 - Linux: Basic Commands

Lecture 16 - Linux: Basic Commands (Continued...)

Lecture 17 - Linux: Users and Permissions

Lecture 18 - Linux: I/O Redirection and Pipes

Lecture 19 - Linux: Task Control

Lecture 20 - Linux: Shell Environment

Lecture 21 - Linux: Text Editors

Lecture 22 - Linux: Compression / Archiving

Lecture 23 - Linux: Print and Sync Commands

Lecture 24 - Linux: File Comparison

Lecture 25 - Basic Networking Administration

Lecture 26 - Filesystems and Devices

Lecture 27 - Shell Introduction

Lecture 28 - Shell Comments and Variables

Lecture 29 - Shell Variables

Lecture 30 - Shell Arrays and Arithmetic

Lecture 31 - Shell Condition and Relation

Lecture 32 - Shell Examples

Lecture 33 - Shell Functions

Lecture 34 - Shell File Test

Lecture 35 - Shell Loop Control

Lecture 36 - Shell Script Variations

Lecture 37 - Shell Pattern Matching

Lecture 38 - Shell Case Statements

Lecture 39 - Shell Co-routines

Lecture 40 - Shell Signals and Traps

Lecture 41 - Shell Subshell

Lecture 42 - Shell Declarations

Lecture 43 - Shell Examples 2

Lecture 44 - Shell Review

Lecture 45 - An Introduction

Lecture 46 - Structure of a Network

Lecture 47 - Network Core - Definition

Lecture 48 - Network Access and Physical Media

Lecture 49 - Structure of ISP and Packet Delays

Lecture 50 - Network Protocol Layers

Lecture 51 - Network Devices

Lecture 52 - Network Security - An Introduction

Lecture 53 - Public Key Cryptography

Lecture 54 - Digital Signatures

Lecture 55 - Security in Practise

Lecture 56 - Security in Practise (Continued...)

Lecture 57 - Wireshark

Lecture 58 - Snort

Lecture 59 - Review I

Lecture 60 - Review II