Modules / Lectures
Module NameDownloadDescriptionDownload Size
Prerequisites: Software Installation GuideExperimental setupNotes of Experimental setup407
Need for Secure SystemsSession 1Notes of Session 11841
Need for Secure SystemsSession 2Notes of Session 293
Need for Secure SystemsSession 3Notes of Session 3100
Need for Secure SystemsSession 4Notes of Session 4131
Need for Secure SystemsSession 5Notes of Session 5100
Security and ArchitectureSession 6Notes of Session 681
Security and ArchitectureSession 7Notes of Session 787
Security and ArchitectureSession 8Notes of Session 8122
Security and ArchitectureSession 9Notes of Session 985
Security and ArchitectureSession 10Notes of Session 10101
Features of X86Session 11Notes of Session 11106
Features of X86Session 12Notes of Session 1280
Features of X86Session 13Notes of Session 13108
Features of X86Session 14Notes of Session 14160
Memory Segmentation Deep diveSession 15Notes of Session 15115
Memory Segmentation Deep diveSession 16Notes of Session 1677


New Assignments
Module NameDownload
W1A1W1A1
W2A1W2A1
W3A1W3A1
W4A1W4A1
W5A1W5A1
W6A1W6A1

Sl.No Chapter Name English
1Experimental Setup: Video TutorialDownload
Verified
2Need for Secure SystemsDownload
Verified
3Ignorance of A is Sin of BDownload
Verified
4Function calls and StacksDownload
Verified
5Stack SmashingDownload
Verified
6Virtual Machine Based RootkitsDownload
Verified
7Security and Architecture: IntroductionDownload
Verified
8Structured Computer Organization Completed Download
Verified
9X86 ISA Part1Download
Verified
10X86 ISA Part 2 Download
Verified
11X86 Protected Mode Download
Verified
12X86 Memory SegmentationDownload
Verified
13Process Isolation using SegmentationDownload
Verified
14Paging and Virtual MemoryDownload
Verified
15Task Switching and Interrupt ServiceDownload
Verified
16Memory Segmentation Deep dive P1Download
Verified
17Memory Segmentation Deep dive P2Download
Verified
18Memory Segmentation Deep dive P3 - Week 4Download
Verified
19Memory Segmentation Deep dive P4 - Week 4Download
Verified
20Segmentation Recap - Week 4Download
Verified
21Lab1 Part 1 - Week 4Download
Verified
22Lab1 Part 2 - Week 4Download
Verified
23Lab 1 Part 3 - Week4Download
Verified
24ISR Recap - Week 5Download
Verified
25Lab2 Part 1 - Week 5Download
Verified
26Lab2 Part 2 - Week 5Download
Verified
27Memory Management Recap - Week 5Download
Verified
28Lab3 Part 1 - Week 5Download
Verified
29Lab3 Part 2 - Week 5Download
Verified
30Task Switch recap - Week 6Download
Verified
31Lab4 Part 1 - Week 6Download
Verified
32Lab4 Part 2 - Week 6Download
Verified
33Lab4 Part 3 - Week 6Download
Verified
34Lab4 Part 4 - Week 6Download
Verified
35Introduction to Basic Cryptography - Week7Download
Verified
36Public Key Cryptography - Week 7Download
Verified
37Freescale ARM iMX6 Processor- Week 7Download
Verified
38High Assurance Boot in iMX6 - Week 7Download
Verified
39Case Study - Week 7Download
Verified
40Basics of Networking - Week 8Download
Verified
41Network Processor Vs General Purpose Processor - Week 8Download
Verified
42Network Processor Architecture - Week 8Download
Verified


Sl.No Language Book link
1EnglishDownload
2BengaliNot Available
3GujaratiNot Available
4HindiNot Available
5KannadaNot Available
6MalayalamNot Available
7MarathiNot Available
8TamilNot Available
9TeluguNot Available