NOC:Information Security - II


Lecture 1 - Experimental Setup: Video Tutorial


Lecture 2 - Need for Secure Systems


Lecture 3 - Ignorance of A is Sin of B


Lecture 4 - Function calls and Stacks


Lecture 5 - Stack Smashing


Lecture 6 - Virtual Machine Based Rootkits


Lecture 7 - Security and Architecture: Introduction


Lecture 8 - Structured Computer Organization Completed


Lecture 9 - X86 ISA - Part1


Lecture 10 - X86 ISA - Part 2


Lecture 11 - X86 Protected Mode


Lecture 12 - X86 Memory Segmentation


Lecture 13 - Process Isolation using Segmentation


Lecture 14 - Paging and Virtual Memory


Lecture 15 - Task Switching and Interrupt Service


Lecture 16 - Memory Segmentation Deep dive - Part 1


Lecture 17 - Memory Segmentation Deep dive - Part 2


Lecture 18 - Memory Segmentation Deep dive - Part 3


Lecture 19 - Memory Segmentation Deep dive - Part 4


Lecture 20 - Segmentation Recap


Lecture 21 - Lab 1 - Part 1


Lecture 22 - Lab 1 - Part 2


Lecture 23 - Lab 1 - Part 3


Lecture 24 - ISR Recap


Lecture 25 - Lab 2 - Part 1


Lecture 26 - Lab 2 - Part 2


Lecture 27 - Memory Management Recap


Lecture 28 - Lab 3 - Part 1


Lecture 29 - Lab 3 - Part 2


Lecture 30 - Task Switch recap


Lecture 31 - Lab 4 - Part 1


Lecture 32 - Lab 4 - Part 2


Lecture 33 - Lab 4 - Part 3


Lecture 34 - Lab 4 - Part 4


Lecture 35 - Introduction to Basic Cryptography


Lecture 36 - Public Key Cryptography


Lecture 37 - Freescale ARM iMX6 Processor


Lecture 38 - High Assurance Boot in iMX6


Lecture 39 - Case Study


Lecture 40 - Basics of Networking


Lecture 41 - Network Processor Vs General Purpose Processor


Lecture 42 - Network Processor Architecture