Information Security- II

Start Date
01/07/2018

End Date
07/09/2018

No. of
Enrollments
362 students

No course
syllabus uploaded

Created by

V Kamakoti
IIT Madras
5
out of 5
Based on 2 ratings
5 star 2
4 star 0
3 star 0
2 star 0
1 star 0
Course Language
English
Course Type
Scheduled
Video transcripts
Course Category
Engineering
Learning Path
Undergraduate
Course Length
0 Hours
Weekly time commitments
0 Hours
Course Completion
Exam Date
To be announced
Credits
0

55

Tutorials

0

Test

0

Assignment

0

Article

0

Weekly Reading list

Overview

Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts. 

 

INTENDED AUDIENCE

Students of Core Course, Both UG and PG, BE, ME, MS, PhD

 

PRE-REQUISITES

Basic Programming 

 

COURSE LAYOUT

Week 1: Hardware Security in Modern Compute Systems 

Week 2: Interaction of Compiler and OS with Hardware 

Week 3: Hardware Privilege Levels 

Week 4: Memory Segmentation 

Week 5: Virtual memory and Paging 

Week 6: Interrupt Service Routines 

Week 7: Task Switching 

Week 8: Establishing Hardware Root of Trust 

To access the content, please enroll in the course.

Faculty

V Kamakoti


1) Prof. V. Kamakoti, Department of Computer Science and Engineering, IIT Madras specializes in the area of Computer Architecture and Hardware Design. His introduction to Information Security is through building secure systems. He is an advisor for many security critical organizations including Banking Institutions. He completed his Master of Science (By research) and PhD at the Department of Computer Science and Engineering, IIT Madras in the years 1992 and 1995 respectively. He completed his BE in Computer Science and Engineering from Sri Venketaswara College of Engineering (Affiliated to University of Madras) in the year 1989.

2) Dilip H. Ayyar has close to 18 years of experience in the Information Security area. He has co-founded two companies, the 7i Security (P) Ltd and Deccan Infotech (P) Ltd. These companies are involved in providing services such as Security operations Center, Network Operations Centre, Cloud computing, Virtualization, Storage as a service, etc. His role as a Technical Director includes Security Policy Formulations for clients, Security Audits and Penetration Testing for Clients, Web Security Audits and Concurrent Audit of Information Security. His clients include Bank data centers and stock exchanges. He holds a Bachelors Degree in Engineering, followed by an MBA. He has also got the following certifications- C|CISO, CRISC, CISM, CISA, CEH, CHFI, CFE, CCNA, ISO 27001 Lead Auditor & Implementer, ISO 9001:2008 LEAD AUDITOR, and, BS 15000 IMPLEMENTER

FAQs

No FAQ has been added to this course yet.

Download App

Download SWAYAM applications from popular app stores