Computer System Security(AKTU)

Computer System Security(AKTU)

Course Status: Running
Duration: 11 weeks
Start Date:  
End Date:  
Exam Date:
Category: Computer Science
Level: Undergraduate

*All Dates are tentative and subject to change.

Lessons

  1. Week 01

    1. Lecture 01

      • Introduction
    2. Lecture 02

      • Interview with Prof.Sandeep Shukla, CSE, IIT Kanpur
    3. Lecture 03

      • Sample Attacks
  2. Week 02

    1. Lecture 04

      • The Marketplace for Vulnerabilities
    2. Lecture 05

      • What is Computer Security and What to Learn?
    3. Lecture 06

      • Learning Objectives
    4. Lecture 07

      • Error 404 Hacking digital India part 1 chase
  3. Week 03 -css

    1. Lecture 08

      • Control Hijacking
      • More Control Hijacking attacks integer overflow
      • More Control Hijacking attacks format string vulnerabilities
  4. Week 04 - css

    1. Lecture 11

      • Defense against Control Hijacking - Platform Defenses
    2. Lecture 12

      • Defense against Control Hijacking - Run-time Defenses
    3. Lecture 13

      • Advanced Control Hijacking attacks
    4. Lecture 14-1

      Confidentiality Policies
    5. Lecture 14-2

      Confinement Principle
  5. Week 05 - css

    1. Lecture 14

      • Detour Unix user IDs process IDs and privileges
    2. Lecture 15

      • More on confinement techniques
    3. Lecture 16

      • System call interposition
    4. Lecture 17

      • Error 404 digital Hacking in India part 2 chase
    5. Lecture 18

      • VM based isolation
    6. Lecture 19

      • Confinement principle
    7. Lecture 20

      • Software fault isolation
  6. Week 06

    1. Lecture 21

      • Rootkits
    2. Lecture 22

      • Intrusion Detection Systems
    3. Lecture 23

      • Secure architecture principles isolation and leas
    4. Lecture 24

      • Access Control Concepts
    5. Lecture 25

      • Are you sure you have never been hacked Sandeep Shukla
  7. Week 07

    1. Lecture 26

      • Unix and windows access control summary
    2. Lecture 27

      • Other issues in access control
    3. Lecture 28

      • Introduction to browser isolation
    4. Lecture 29

      • Web security landscape
    5. Lecture 30

      • Web security definitions goals and threat models
    6. Lecture 31

      • HTTP content rendering
  8. Week 08

    1. Lecture 32

      • Browser isolation
    2. Lecture 33

      • Security interface
    3. Lecture 34

      • Cookies frames and frame busting
    4. Lecture 35

      • Major web server threats
  9. Week 09

    1. Lecture 36

      • Cross site request forgery
    2. Lecture 37

      • Cross site scripting
    3. Lecture 38

      • Defenses and protections against XSS
    4. Lecture 39

      • Finding vulnerabilities
    5. Lecture 40

      • Secure development
    6. Lecture 41

      • Basic cryptography
    7. Lecture 42

      • Public key cryptography
  10. Week 10

    1. Lecture 43

      • RSA public key cryptography
    2. Lecture 44

      • Digital signature Hash functions
    3. Lecture 45

      • Public key distribution
    4. Lecture 46

      • Real world protocols
    5. Lecture 47

      • Basic terminologies
    6. Lecture 48

      • Email security certificates
    7. Lecture 49

      • Transport Layer security TLS
    8. Lecture 50

      • IP security
    9. Lecture 51

      • DNS security