Hardware Architectures and Operating Systems Security

Everyone
  • 15 videos | 1h 55m 21s
  • Includes Assessment
Learn about system security, the study of security and vulnerabilities of individual computers.

WHAT YOU WILL LEARN

  • Understand why using hardware to enforce security is good
    Know about the history of multics
    Understand how multics set the stage for important knowledge today
    Know what lessons were learned from multics
    Understand the techniques attackers use to take over machines
    Understand how enforced semantics helps in security
    Understand how to protect information during information flow
    Understand what a capability machine is
  • Understand the basics of operating systems security
    Understand complete mediation
    Understand the guard model and complete mediation
    Understand how to minimize the trusted computing base
    Know how difficult it is to get a bug-free tcb
    Know how to find unstable code
    Tie up all of the knowledge learned in the systems security videos

IN THIS COURSE

  • 5m 16s
    Gain an understanding about why hardware is important in security. FREE ACCESS
  • 4m 57s
    Learn about a hardware system of the past FREE ACCESS
  • Locked
    3.  Hardware Architectures For Security Video 2 - Part 2
    7m 25s
    Learn how Multics has relevence today. FREE ACCESS
  • Locked
    4.  Hardware Architectures For Security Video 3
    3m 50s
    Find out what lessons were learned from past systems FREE ACCESS
  • Locked
    5.  Hardware Architectures For Security Video 4
    10m 33s
    Learn how attackers take over your machine. FREE ACCESS
  • Locked
    6.  Hardware Architectures For Security Video 5 - Part 1
    12m 46s
    Learn how to enforce properties at the architectural level. FREE ACCESS
  • Locked
    7.  Hardware Architectures For Security Video 5 - Part 2
    7m 2s
    Learn about how information flow relates to security. FREE ACCESS
  • Locked
    8.  Hardware Architectures For Security Video 6
    9m 6s
    Learn about capability machines. FREE ACCESS
  • Locked
    9.  Operating Systems Security Video 1
    5m 29s
    Learn what operating systems security is. FREE ACCESS
  • Locked
    10.  Operating Systems Security Video 2
    11m 27s
    Learn about complete mediation. FREE ACCESS
  • Locked
    11.  Operating Systems Security Video 3
    9m 35s
    Learn about the guard model and complete mediation. FREE ACCESS
  • Locked
    12.  Operating Systems Security Video 4
    2m 43s
    Learn how to minimize the trusted computing base. FREE ACCESS
  • Locked
    13.  Operating Systems Security Video 5
    13m 20s
    Learn how difficult it is to get a bug-free TCB. FREE ACCESS
  • Locked
    14.  Operating Systems Security Video 6
    10m 11s
    Learn how to find unstable code. FREE ACCESS
  • Locked
    15.  Operating Systems Security Video 7
    1m 44s
    Wrap up everything we have learned in operating systems security. FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.4 of 27 users Rating 4.4 of 27 users (27)