NPTEL : NOC:Information Security - II (Computer Science and Engineering)

Co-ordinators : Prof. V. Kamakoti


Lecture 1 - Experimental Setup: Video Tutorial

Lecture 2 - Need for Secure Systems

Lecture 3 - Ignorance of A is Sin of B

Lecture 4 - Function calls and Stacks

Lecture 5 - Stack Smashing

Lecture 6 - Virtual Machine Based Rootkits

Lecture 7 - Security and Architecture: Introduction

Lecture 8 - Structured Computer Organization Completed

Lecture 9 - X86 ISA - Part1

Lecture 10 - X86 ISA - Part 2

Lecture 11 - X86 Protected Mode

Lecture 12 - X86 Memory Segmentation

Lecture 13 - Process Isolation using Segmentation

Lecture 14 - Paging and Virtual Memory

Lecture 15 - Task Switching and Interrupt Service

Lecture 16 - Memory Segmentation Deep dive - Part 1

Lecture 17 - Memory Segmentation Deep dive - Part 2

Lecture 18 - Memory Segmentation Deep dive - Part 3

Lecture 19 - Memory Segmentation Deep dive - Part 4

Lecture 20 - Segmentation Recap

Lecture 21 - Lab 1 - Part 1

Lecture 22 - Lab 1 - Part 2

Lecture 23 - Lab 1 - Part 3

Lecture 24 - ISR Recap

Lecture 25 - Lab 2 - Part 1

Lecture 26 - Lab 2 - Part 2

Lecture 27 - Memory Management Recap

Lecture 28 - Lab 3 - Part 1

Lecture 29 - Lab 3 - Part 2

Lecture 30 - Task Switch recap

Lecture 31 - Lab 4 - Part 1

Lecture 32 - Lab 4 - Part 2

Lecture 33 - Lab 4 - Part 3

Lecture 34 - Lab 4 - Part 4

Lecture 35 - Introduction to Basic Cryptography

Lecture 36 - Public Key Cryptography

Lecture 37 - Freescale ARM iMX6 Processor

Lecture 38 - High Assurance Boot in iMX6

Lecture 39 - Case Study

Lecture 40 - Basics of Networking

Lecture 41 - Network Processor Vs General Purpose Processor

Lecture 42 - Network Processor Architecture