Course Details

Exam Registration753
Course StatusOngoing
Course TypeElective
LanguageEnglish
Duration8 weeks
CategoriesComputer Science and Engineering, Systems, Cyber Security
Credit Points2
LevelUndergraduate/Postgraduate
Start Date19 Jan 2026
End Date13 Mar 2026
Enrollment Ends02 Feb 2026
Exam Registration Ends16 Feb 2026
Exam Date28 Mar 2026 IST
NCrF Level4.5 — 8.0

Master the Art of Building Secure Systems: An 8-Week Journey with IIT Madras

In today's interconnected digital landscape, the threat of cyber-security attacks is escalating at an unprecedented rate. Developing computer systems that are merely efficient is no longer sufficient; they must be fundamentally secure. The Information Security - 5: Secure Systems Engineering course, offered by the prestigious Indian Institute of Technology Madras (IIT Madras), addresses this critical need head-on. This comprehensive 8-week program, led by renowned expert Prof. Chester Rebeiro, delves deep into the mechanisms of system vulnerabilities and the strategies to fortify against them.

Your Guide: Prof. Chester Rebeiro

Gain insights from a leading authority in the field. Prof. Chester Rebeiro is an Assistant Professor at IIT Madras, bringing a wealth of knowledge from his PhD at IIT Kharagpur and post-doctoral research at Columbia University. His specialized research interests in cryptography, hardware security, and operating system security ensure that the course content is both cutting-edge and deeply practical. Learn more about his work on his academic webpage.

Who Should Enroll?

This course is meticulously designed for a wide range of learners:

  • Students: BTech, BE, ME, MTech, MS, MCA, and BCA students specializing in Computer Science, Information Technology, Electrical, Electronics, or Instrumentation Engineering.
  • Professionals: Developers, engineers, and security analysts in industries focusing on embedded systems, IoT, and software development.

Course Prerequisites

To ensure you get the most out of this advanced course, you should have:

  • A strong command of C programming.
  • A basic understanding of digital logic, computer organization, and operating systems.

Detailed 8-Week Course Curriculum

The course is structured to take you from foundational concepts to advanced security paradigms, covering both software and hardware vulnerabilities.

Week 1: Foundations & Buffer Overflow

Introduction to secure systems engineering, using the GNU Debugger (gdb), and understanding the classic yet critical buffer overflow vulnerability.

Week 2: Defending Against Buffer Overflows

Learn modern techniques and mechanisms to prevent and mitigate buffer overflow-based malware, a cornerstone of software security.

Week 3: Advanced Software Vulnerabilities

Explore integer overflows, buffer overreads, and heap overflows, understanding how subtle programming errors can lead to major security breaches.

Week 4: Heap Exploits & Access Control

Dive deeper into sophisticated heap overflow attacks and study fundamental access control models that form the backbone of system security.

Week 5: Confinement

Understand the principles of confinement and sandboxing, techniques used to restrict the capabilities of untrusted code.

Week 6: Trusted Execution Environments (TEEs)

Examine hardware-assisted security with an in-depth look at Intel SGX and ARM TrustZone, technologies enabling secure enclaves for sensitive computations.

Week 7: Micro-architectural Attacks

Investigate cutting-edge threats like Meltdown and Spectre. Learn how side-channels based on execution time and power consumption can leak sensitive information.

Week 8: Hardware Security

Conclude with a focus on hardware root of trust, physical attacks, and countermeasures, understanding security at the most fundamental layer of computing.

Real-World Relevance: Analyzing Major Cyber-Attacks

This course stands out by connecting theory to real-world incidents. You will analyze famous attacks such as:

  • Heartbleed: A catastrophic buffer over-read in the OpenSSL library.
  • Stagefright: A set of vulnerabilities in Android's media playback engine.
  • Meltdown & Spectre: Modern micro-architectural attacks exploiting CPU optimization features.

Industry Support & Applications

The skills imparted in this course are in high demand across the tech industry, particularly in companies developing:

  • Embedded Systems and IoT Devices
  • Secure Operating Systems & Hypervisors
  • Cryptographic Hardware and Software
  • Consumer Electronics and Critical Infrastructure

Embark on this 8-week journey with IIT Madras to transform your understanding of system security. Move from being aware of vulnerabilities to actively engineering robust, secure systems capable of withstanding the evolving threat landscape. Enroll today and build the secure digital future.

Enroll Now →

Explore More

Mock Test All Courses Start Learning Today