Computer System Security

Computer System Security

Computer System Security

Course Status: Running
Duration: 11 weeks
Start Date: 20 January 2020
End Date: 10 April 2020
Exam Date:  
Category: Computer Science
Level: Undergraduate

Lessons

  1. Week 01

    1. Lecture 01

      • Introduction
    2. Lecture 02

      • Interview with Prof.Sandeep Shukla, CSE, IIT Kanpur
    3. Lecture 03

      • Sample Attacks
  2. Week 02

    1. Lecture 04

      • The Marketplace for Vulnerabilities
    2. Lecture 05

      • What is Computer Security and What to Learn?
    3. Lecture 06

      • Learning Objectives
    4. Lecture 07

      • Error 404 Hacking digital India part 1 chase
  3. Week 03

    1. Lecture 08

      • Control Hijacking
      • More Control Hijacking attacks integer overflow
      • More Control Hijacking attacks format string vulnerabilities
  4. Week 04

    1. Lecture 11

      • Defense against Control Hijacking - Platform Defenses
    2. Lecture 12

      • Defense against Control Hijacking - Run-time Defenses
    3. Lecture 13

      • Advanced Control Hijacking attacks
    4. Lecture 14-1

      Confidentiality Policies
    5. Lecture 14-2

      Confinement Principle
    1. Lecture 14

      • Detour Unix user IDs process IDs and privileges
    2. Lecture 15

      • More on confinement techniques
    3. Lecture 16

      • System call interposition
    4. Lecture 17

      • Error 404 digital Hacking in India part 2 chase
    5. Lecture 18

      • VM based isolation
    6. Lecture 19

      • Confinement principle
    7. Lecture 20

      • Software fault isolation
  5. Week 06

    1. Lecture 21

      • Rootkits
    2. Lecture 22

      • Intrusion Detection Systems
    3. Lecture 23

      • Secure architecture principles isolation and leas
    4. Lecture 24

      • Access Control Concepts
    5. Lecture 25

      • Are you sure you have never been hacked Sandeep Shukla
  6. Week 07

    1. Lecture 26

      • Unix and windows access control summary
    2. Lecture 27

      • Other issues in access control
    3. Lecture 28

      • Introduction to browser isolation
    4. Lecture 29

      • Web security landscape
    5. Lecture 30

      • Web security definitions goals and threat models
    6. Lecture 31

      • HTTP content rendering
  7. Week 08

    1. Lecture 32

      • Browser isolation
    2. Lecture 33

      • Security interface
    3. Lecture 34

      • Cookies frames and frame busting
    4. Lecture 35

      • Major web server threats
  8. Week 09

    1. Lecture 36

      • Cross site request forgery
    2. Lecture 37

      • Cross site scripting
    3. Lecture 38

      • Defenses and protections against XSS
    4. Lecture 39

      • Finding vulnerabilities
    5. Lecture 40

      • Secure development
    6. Lecture 41

      • Basic cryptography
    7. Lecture 42

      • Public key cryptography
  9. Week 10

    1. Lecture 43

      • RSA public key cryptography
    2. Lecture 44

      • Digital signature Hash functions
    3. Lecture 45

      • Public key distribution
    4. Lecture 46

      • Real world protocols
    5. Lecture 47

      • Basic terminologies
    6. Lecture 48

      • Email security certificates
    7. Lecture 49

      • Transport Layer security TLS
    8. Lecture 50

      • IP security
    9. Lecture 51

      • DNS security
  10. Week 11

    1. Lecture 52

      • Internet infrastructure
    2. Lecture 53

      • Basic security problems
    3. Lecture 54

      • Routing security
    4. Lecture 55

      • DNS revisited
    5. Lecture 56

      • Summary of weaknesses of internet security
    6. Lecture 57

      • Link layer connectivity and TCP IP connectivity
    7. Lecture 58

      • Packet filtering firewall
    8. Lecture 59

      • Intrusion detection
    9. Lecture 60

      • Concluding remarks
Open chat
Powered by
', { 'anonymize_ip': true });