Description
About the course
Professor. V. Kamakoti, a faculty of the Department of Computer Science and Engineering, Indian Institute of Technology, Madras, has designed the second course on Information security. In this second course on you will be able to deal with the hardware infrastructure available in contemporary architectures, that are vital for building secure systems. In addition to this, you will also be able to take into consideration, the x86, ARM and PowerPC based architectures as case studies to understand the different concepts of Information Security. This course covers the Hardware Security in Modern Computer Systems, Interaction of Compiler and OS with Hardware, Hardware Privilege Levels, Memory Segmentation, Virtual memory and Paging, Interrupt Service Routines, Task Switching, Establishing Hardware Root of Trust.
Learning Outcomes
After completing this course, you will be able to:
- Understand the cybersecurity risks.
- Understand the Information and cybersecurity concepts.
- Implement these principles of Cybersecurity. Design a secure information system on your own.
- Boost your hireability through innovative and independent learning.
Target Audience
The course can be taken by:
Students: Students: All students who are pursuing any technical/professional courses, and interested in learning IT Security / Network Security / Cyber Security.
Teachers/Faculties: All teachers/faculties who wish to acquire new skills or improve their efficiency in information security.
Professionals: All IT Security / Network Security / Cyber Security professionals.
Why learn Information Security - II?
Every day we hear about the newest attack, the latest exploit, or another cyber threat. In response, we hire security consultants, look for the best security team we can find, and buy the latest products from the security vendors. Information security isn’t limited to one sector, such as banks or finance, there are opportunities in retail, university settings and anywhere else, where data has value. The career prospects are bright for the candidates seeking a career in Information Security/Cyber Security. Information security is about defending data and critical information from unauthorized access, use, and potential destruction. It’s a field that is projected to grow by 22 percent through 2020 and opportunities are abundant for newcomers to this in-demand career. It should be noted that the demand for information security professionals has exceeded the demand for information technology professionals, and it is likely to continue as the times passes.
Course Features
- 24X7 Access: You can view lectures as per your own convenience.
- Online lectures: 18 hours of online lectures with high-quality videos.
- Updated Quality content: Content is latest and gets updated regularly to meet the current industry demands.
Test & Evaluation
There will be a final test containing a set of multiple choice questions. Your evaluation will include the scores achieved in the final test.
Certification
This course is free and it has no certificate.
Topics to be covered
-
- Information Security-01
- Introduction (Open Video)
- How the computer architecture has evolved?
- Information Security-02
- What is the effect of ignorance in security?
- Why there is an ignorance and why is Security an Issue?
- What is the security in Operating Systems?
- Information Security-03
- What is a function call?
- What is a Stack and how it is used for function calls?
- Information Security-04
- What is a Stack Frame and what is the Buffer Overflow Vulnerability?
- What is Stack Smashing?
- Information Security-05
- What is the concept of Virtual Machine Based Rootkits (VMBRs)?
- How to get a VMBR installed and what it can do?
- Why Security is very challenging?
- Doubt Clearing Session
- Information Security-06
- How architecture and security are related?
- What is Security from the point of view of Hardware?
- What is Memory Isolation and Code Privilege?
- Doubts clearing session
- Information Security-07
- What is Computer Organization and Structured Computer Organization?
- What is the concept of Memory Management?
- What is Ease of Programming?
- What is Process Mobility?
- Information Security-08
- How CISC and RISC differ from each other?
- What are the different Intel General Purpose Registers, 64-Bit and 128-Bit Registers?
- What are the different Intel Segment Registers?
- Why Multiple Segments are needed and what is Multiprocess Context Switching?
- What are the different Control Registers?
- Information Security-09
- What are Extended Flags (EFLAGS) and what are the various flag registers?
- What are Extended Flags (EFLAGS) and what are the various flag registers (Continued)?
- Information Security-10
- How x86 processor works?
- What is Protected Mode?
- What is a Limit?
- What are privilege Levels?
- What protections can be achieved due to the privilege levels?
- Information Security-11
- How to implement protection and what are the different types of Descriptor Tables?
- What is the structure of a Descriptor?
- How to update Segment Registers?
- Information Security-12
- What are Descriptor Tables and what is the structure of a Selector?
- What is the Interprocess protection?
- What are some of the architectural issues?
- What caution is needed?
- Information Security-13
- What is the concept of Virtual Memory?
- What are the Paging fundamentals?
- What is Paging Technique (Single Translation)?
- What is Paging Technique (Multiple Transaction)?
- What would be an entry in page directory and page table?
- Information Security-14
- What is Task Switching?
- What is a Task State Segment?
- What is Task Switching Process?
- How to handle interrupts?
- How to handle interrupts (Continued)?
- Information Security-15
- What is a Segment Descriptor?
- What are the types of Segment Descriptors?
- Information Security-16
- What are Descriptor Tables and where are they located?
- What are Segment Selectors and how to load them into segment registers?
- What is Local Descriptor Table?
- Information Security-17
- What are Privilege Levels and what is Privilege Protection?
- What is Type 1 Privilege Checking and what are I/O Instructions?
- What is Type 2 and Type 3 Privilege Checking?
- Information Security-18
- How to change Privilege Level and what are Conforming Code Segments?
- What is Call Gate Descriptor?
- How to call Higher Privileged code?
- Information Security-19
- Review of Segmentation and Privilege Levels (Part-1)
- Review of Segmentation and Privilege Levels (Part-2)
- Review of Segmentation and Privilege Levels (Part-3)
- Information Security-20
- How to Invoke virtual box (Part-1)
- How to Invoke virtual box (Part-2)
- Information Security-21
- Programming assignment related to Segmentation (Part-1)
- Programming assignment related to Segmentation (Part-2)
- Programming assignment related to Segmentation (Part-3)
- Information Security-22
- Programming assignment related to Segmentation (Part-4)
- Programming assignment related to Segmentation (Part-5)
- Programming assignment related to Segmentation (Part-6)
- Programming assignment related to Segmentation (Part-5)
- Information Security-23
- What are Interrupts and their importance?
- How interrupts differ from exceptions and what are the different types of interrupts and exceptions?
- What are the security implications of interrupts and what are the different IDT Descriptors?
- What are the protection mechanisms on Intel x86, what are the types of Control Transfer and error codes for Exception handlers?
- Information Security-24
- Demonstration of Programming assignment related to Interrupt service routines (Part-1)
- Demonstration of Programming assignment related to Interrupt service routines (Part-2)
- Information Security-25
- Demonstration of Programming assignment related to Interrupt service routines (Part-3)
- Information Security-26
- What is the concept of Paging (Part-1)?
- What is the concept of Paging (Part-2)?
- Information Security-27
- Programming assignment related to Paging (Part-1)
- Programming assignment related to Paging (Part-2)
- Programming assignment related to Paging (Part-3)
- Information Security-28
- Programming assignment related to Paging (Part-4)
- Programming assignment related to Paging (Part-5)
- Information Security-29
- What is a Task and Task Management and why it is important in Information Security?
- What information a Task should have and what is Task Switch Management?
- What is the Task Switching Method 1?
- What is the Task Switching Method 2?
- What are the different types of Task Switching and how Task Switch happens?
- Information Security-30
- Programming assignment related to Task Switching (Part-1)
- Programming assignment related to Task Switching (Part-2)
- Programming assignment related to Task Switching (Part-3)
- Information Security-31
- Programming assignment related to Task Switching (Part-4)
- Programming assignment related to Task Switching (Part-5)
- Programming assignment related to Task Switching (Part-6)
- Information Security-32
- Programming assignment related to Task Switching (Part-7)
- Programming assignment related to Task Switching (Part-8)
- Programming assignment related to Task Switching (Part-9)
- Information Security-33
- Programming assignment related to Task Switching (Part-10)
- Programming assignment related to Task Switching (Part-11)
- Programming assignment related to Task Switching (Part-12)
- Information Security-34
- What are the basic Cryptographic Principles?
- What is Symmetric Key Cryptography and Public Key Cryptography?
- Information Security-35
- What are Public Key Encryption Algorithms and what is Authentication?
- What are Hash Functions?
- What are Digital Signatures and message digests, How message digests are related to digital signatures?
- What are the different Hash Function algorithms and Public Key Certificates?
- Information Security-36
- What are the iMX6 Chip Security components?
- What are TrustZone Security Extensions?
- What is SNVS, CAAM and CSU?
- What is TrustZone WatchDog feature, IMX6 Boot Sequence and USB Boot Flow?
- Why IMX6 Trust Architecture is required and what are its features?
- Information Security-37
- What is High Assurance Boot (HAB) in IMX6?
- What are the HAB Enablement Tools and what is Manufacturing tool ?
- What is Freescale Reference CST and security configuration of?
- Information Security-38
- Case Study based on designing and developing a secure tablet device based on iMX6
- Information Security-39
- What is the 7 Layer OSI Model and how processing takes place at each layer?
- What is Packet processing and Frame processing?
- What are Switches and Routers and what is Network Security?
- Information Security-40
- How routers have evolved and what is their architecture (Part-1)?
- How routers have evolved and what is their architecture (Part-2)?
- Information Security-41
- How does the Network Processor Architecture look like?
- What are the security aspects of Network Processors (Part-1)?
- What are the security aspects of Network Processors (Part-2)?
- Information Security_ Final Quiz
- Information Security-01
Note : Parts of this material has been sourced from NPTEL, adapted and modified to adhere to our Pedagogical requirements and uploaded to YouTube for reuse under the same license.
Reviews
There are no reviews yet.