Information Security- II
Offered By: Indian Institute of Technology Madras via Swayam
Course Description
Overview
Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts.
Syllabus
Week 1: Hardware Security in Modern Compute Systems
Week 2: Interaction of Compiler and OS with Hardware
Week 3: Hardware Privilege Levels
Week 4: Memory Segmentation
Week 5: Virtual memory and Paging
Week 6: Interrupt Service Routines
Week 7: Task Switching
Week 8: Establishing Hardware Root of Trust
Taught by
V. Kamakoti
Tags
Related Courses
Introduction to Enterprise ComputingMarist College via Independent Advanced Operating Systems
Georgia Institute of Technology via Udacity Programmation sur iPhone et iPad (partie I)
Université Pierre et Marie CURIE via France Université Numerique 操作系统原理(Operating Systems)
Peking University via Coursera Introduction to Operating Systems
Georgia Institute of Technology via Udacity