Get started with custom lists to organize and share courses.

Sign up

Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Information Security- II

Indian Institute of Technology Madras via NPTEL

0 Reviews 60 students interested

Taken this course? Share your experience with other students. Write review

Overview

Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts. 

Syllabus

Week 1: Hardware Security in Modern Compute Systems 
Week 2: Interaction of Compiler and OS with Hardware 
Week 3: Hardware Privilege Levels 
Week 4: Memory Segmentation 
Week 5: Virtual memory and Paging 
Week 6: Interrupt Service Routines 
Week 7: Task Switching 
Week 8: Establishing Hardware Root of Trust 

Taught by

V. Kamakoti

Reviews for NPTEL's Information Security- II
Based on 0 reviews

  • 5 star 0%
  • 4 star 0%
  • 3 star 0%
  • 2 star 0%
  • 1 star 0%

Did you take this course? Share your experience with other students.

Write a review

Class Central

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free

Never stop learning Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.