Lecture 1 - Experimental Setup: Video Tutorial
Lecture 2 - Need for Secure Systems
Lecture 3 - Ignorance of A is Sin of B
Lecture 4 - Function calls and Stacks
Lecture 5 - Stack Smashing
Lecture 6 - Virtual Machine Based Rootkits
Lecture 7 - Security and Architecture: Introduction
Lecture 8 - Structured Computer Organization Completed
Lecture 9 - X86 ISA - Part1
Lecture 10 - X86 ISA - Part 2
Lecture 11 - X86 Protected Mode
Lecture 12 - X86 Memory Segmentation
Lecture 13 - Process Isolation using Segmentation
Lecture 14 - Paging and Virtual Memory
Lecture 15 - Task Switching and Interrupt Service
Lecture 16 - Memory Segmentation Deep dive - Part 1
Lecture 17 - Memory Segmentation Deep dive - Part 2
Lecture 18 - Memory Segmentation Deep dive - Part 3
Lecture 19 - Memory Segmentation Deep dive - Part 4
Lecture 20 - Segmentation Recap
Lecture 21 - Lab 1 - Part 1
Lecture 22 - Lab 1 - Part 2
Lecture 23 - Lab 1 - Part 3
Lecture 24 - ISR Recap
Lecture 25 - Lab 2 - Part 1
Lecture 26 - Lab 2 - Part 2
Lecture 27 - Memory Management Recap
Lecture 28 - Lab 3 - Part 1
Lecture 29 - Lab 3 - Part 2
Lecture 30 - Task Switch recap
Lecture 31 - Lab 4 - Part 1
Lecture 32 - Lab 4 - Part 2
Lecture 33 - Lab 4 - Part 3
Lecture 34 - Lab 4 - Part 4
Lecture 35 - Introduction to Basic Cryptography
Lecture 36 - Public Key Cryptography
Lecture 37 - Freescale ARM iMX6 Processor
Lecture 38 - High Assurance Boot in iMX6
Lecture 39 - Case Study
Lecture 40 - Basics of Networking
Lecture 41 - Network Processor Vs General Purpose Processor
Lecture 42 - Network Processor Architecture