Course Name: Information Security- II

Course abstract

Building Secure Systems involve secure hardware, secure micro architecture, secure operating systems, secure compilers and secure application development. Out of these, ensuring security at the hardware is most crucial as it is THE ROOT OF TRUST. In other words, however secure the Operating System, Compilers and Applications be, if the hardware on which these thrive is not secure, then the entire system can be compromised. The security of the system is a collective responsibility of Hardware and Software. In this second course in the Information Security series we shall deal with the hardware infrastructure available in contemporary architectures that are vital for building secure systems. We shall take the x86, ARM and PowerPC based architectures as case studies to explain the concepts.


Course Instructor

Media Object

Prof. Kamakoti

V. Kamakoti is Professor of Computer Science and Engineering, Indian Institute of Technology Madras. He specializes in the areas of Computer Architecture and Secure Systems Engineering. He is a coordinator of the Information Security Education and Awareness program of the Department of Information Technology, Government of India.
Course Sponsors

Teaching Assistant(s)

Prasanna Karthik V

PhD (Pursuing), Computer Science & Engineering
IIT Madras

Arnab Roy

MS (Pursuing), Computer Science & Engineering
IIT Madras

 Course Duration : Jan-Mar 2016

  View Course

 Enrollment : 05-Dec-2015 to 04-Feb-2016

 Exam Date : 20-Mar-2016

Enrolled

6155

Registered

313

Certificate Eligible

259

Certified Category Count

Gold

0

Silver

0

Elite

11

Successfully completed

29

Participation

219

Success

Elite

Gold





Legend

>=90 - Elite+Gold
60-89 - Elite
35-59 - Successfully Completed
<=34 - Certificate of Participation

Final Score Calculation Logic

  • Assignment Score = 20% of assignment 1 + 10% of Assignment 2 + 10% of Assignment 3
  • Score on display: week 8 indicates Honor code exam scores
  • FINAL SCORE (Score on Certificate) = 40% of Exam Score + 40% of Assignment Score + 20% of Honor code exam score
Information Security- II - Toppers list

ADIGA SHREESH H 82%

RV COLLEGE OF ENGINEERING

S VAISHNAVI 73%

R.M.K. COLLEGE OF ENGINEERING AND TECHNOLOGY

SENTHIL KUMARAN MUGUNDU MUTHURAMAN 72%

ORACLE

VIPUL KULKARNI 72%

TCS

D KASI VISWANATH 71%

MADANAPALLE INSTITUTE OF TECHNOLOGY AND SCIENCE

RAVI SHEKHAR SINHA 68%

DAV COLLEGE

AMIT ANAND 67%

INTEGRATED BUSINESS ENVIRONMENT PVT LTD

ADITHYA N 66%

RV COLLEGE OF ENGINEERING

LOKESH G 64%

UIDAI

GURUPRASAD P 63%

OFFICE OF THE PRINCIPAL AG G AND S

Assignment

Exam score

Final score

Score Distribution Graph - Legend

Assignment Score: Distribution of average scores garnered by students per assignment.
Exam Score : Distribution of the final exam score of students.
Final Score : Distribution of the combined score of assignments and final exam, based on the score logic.