Lecture 1 - Operating System Introduction
Lecture 2 - Storage Hierarchy, Exceptions, Interrupts and traps
Lecture 3 - OS Management Services
Lecture 4 - OS Security Issues
Lecture 5 - Process and Threads
Lecture 6 - Process Scheduling
Lecture 7 - Scheduling Algorithm
Lecture 8 - Process Synchronization
Lecture 9 - Memory Management - 1
Lecture 10 - Memory Management - 2
Lecture 11 - File Systems - 1
Lecture 12 - File Systems - 2
Lecture 13 - Unix Filesystem
Lecture 14 - Unix Filesystem (Continued...)
Lecture 15 - Linux: Basic Commands
Lecture 16 - Linux: Basic Commands (Continued...)
Lecture 17 - Linux: Users and Permissions
Lecture 18 - Linux: I/O Redirection and Pipes
Lecture 19 - Linux: Task Control
Lecture 20 - Linux: Shell Environment
Lecture 21 - Linux: Text Editors
Lecture 22 - Linux: Compression / Archiving
Lecture 23 - Linux: Print and Sync Commands
Lecture 24 - Linux: File Comparison
Lecture 25 - Basic Networking Administration
Lecture 26 - Filesystems and Devices
Lecture 27 - Shell Introduction
Lecture 28 - Shell Comments and Variables
Lecture 29 - Shell Variables
Lecture 30 - Shell Arrays and Arithmetic
Lecture 31 - Shell Condition and Relation
Lecture 32 - Shell Examples
Lecture 33 - Shell Functions
Lecture 34 - Shell File Test
Lecture 35 - Shell Loop Control
Lecture 36 - Shell Script Variations
Lecture 37 - Shell Pattern Matching
Lecture 38 - Shell Case Statements
Lecture 39 - Shell Co-routines
Lecture 40 - Shell Signals and Traps
Lecture 41 - Shell Subshell
Lecture 42 - Shell Declarations
Lecture 43 - Shell Examples 2
Lecture 44 - Shell Review
Lecture 45 - An Introduction
Lecture 46 - Structure of a Network
Lecture 47 - Network Core - Definition
Lecture 48 - Network Access and Physical Media
Lecture 49 - Structure of ISP and Packet Delays
Lecture 50 - Network Protocol Layers
Lecture 51 - Network Devices
Lecture 52 - Network Security - An Introduction
Lecture 53 - Public Key Cryptography
Lecture 54 - Digital Signatures
Lecture 55 - Security in Practise
Lecture 56 - Security in Practise (Continued...)
Lecture 57 - Wireshark
Lecture 58 - Snort
Lecture 59 - Review I
Lecture 60 - Review II