NOC:Information Security-3


Lecture 1 - Operating System Introduction


Lecture 2 - Storage Hierarchy, Exceptions, Interrupts and traps


Lecture 3 - OS Management Services


Lecture 4 - OS Security Issues


Lecture 5 - Process and Threads


Lecture 6 - Process Scheduling


Lecture 7 - Scheduling Algorithm


Lecture 8 - Process Synchronization


Lecture 9 - Memory Management - 1


Lecture 10 - Memory Management - 2


Lecture 11 - File Systems - 1


Lecture 12 - File Systems - 2


Lecture 13 - Unix Filesystem


Lecture 14 - Unix Filesystem (Continued...)


Lecture 15 - Linux: Basic Commands


Lecture 16 - Linux: Basic Commands (Continued...)


Lecture 17 - Linux: Users and Permissions


Lecture 18 - Linux: I/O Redirection and Pipes


Lecture 19 - Linux: Task Control


Lecture 20 - Linux: Shell Environment


Lecture 21 - Linux: Text Editors


Lecture 22 - Linux: Compression / Archiving


Lecture 23 - Linux: Print and Sync Commands


Lecture 24 - Linux: File Comparison


Lecture 25 - Basic Networking Administration


Lecture 26 - Filesystems and Devices


Lecture 27 - Shell Introduction


Lecture 28 - Shell Comments and Variables


Lecture 29 - Shell Variables


Lecture 30 - Shell Arrays and Arithmetic


Lecture 31 - Shell Condition and Relation


Lecture 32 - Shell Examples


Lecture 33 - Shell Functions


Lecture 34 - Shell File Test


Lecture 35 - Shell Loop Control


Lecture 36 - Shell Script Variations


Lecture 37 - Shell Pattern Matching


Lecture 38 - Shell Case Statements


Lecture 39 - Shell Co-routines


Lecture 40 - Shell Signals and Traps


Lecture 41 - Shell Subshell


Lecture 42 - Shell Declarations


Lecture 43 - Shell Examples 2


Lecture 44 - Shell Review


Lecture 45 - An Introduction


Lecture 46 - Structure of a Network


Lecture 47 - Network Core - Definition


Lecture 48 - Network Access and Physical Media


Lecture 49 - Structure of ISP and Packet Delays


Lecture 50 - Network Protocol Layers


Lecture 51 - Network Devices


Lecture 52 - Network Security - An Introduction


Lecture 53 - Public Key Cryptography


Lecture 54 - Digital Signatures


Lecture 55 - Security in Practise


Lecture 56 - Security in Practise (Continued...)


Lecture 57 - Wireshark


Lecture 58 - Snort


Lecture 59 - Review I


Lecture 60 - Review II