Secure Systems Engineering Course | IIT Madras Prof. Chester Rebeiro | Cyber Security
Course Details
| Exam Registration | 753 |
|---|---|
| Course Status | Ongoing |
| Course Type | Elective |
| Language | English |
| Duration | 8 weeks |
| Categories | Computer Science and Engineering, Systems, Cyber Security |
| Credit Points | 2 |
| Level | Undergraduate/Postgraduate |
| Start Date | 19 Jan 2026 |
| End Date | 13 Mar 2026 |
| Enrollment Ends | 02 Feb 2026 |
| Exam Registration Ends | 16 Feb 2026 |
| Exam Date | 28 Mar 2026 IST |
| NCrF Level | 4.5 — 8.0 |
Master the Art of Building Secure Systems: An 8-Week Journey with IIT Madras
In today's interconnected digital landscape, the threat of cyber-security attacks is escalating at an unprecedented rate. Developing computer systems that are merely efficient is no longer sufficient; they must be fundamentally secure. The Information Security - 5: Secure Systems Engineering course, offered by the prestigious Indian Institute of Technology Madras (IIT Madras), addresses this critical need head-on. This comprehensive 8-week program, led by renowned expert Prof. Chester Rebeiro, delves deep into the mechanisms of system vulnerabilities and the strategies to fortify against them.
Your Guide: Prof. Chester Rebeiro
Gain insights from a leading authority in the field. Prof. Chester Rebeiro is an Assistant Professor at IIT Madras, bringing a wealth of knowledge from his PhD at IIT Kharagpur and post-doctoral research at Columbia University. His specialized research interests in cryptography, hardware security, and operating system security ensure that the course content is both cutting-edge and deeply practical. Learn more about his work on his academic webpage.
Who Should Enroll?
This course is meticulously designed for a wide range of learners:
- Students: BTech, BE, ME, MTech, MS, MCA, and BCA students specializing in Computer Science, Information Technology, Electrical, Electronics, or Instrumentation Engineering.
- Professionals: Developers, engineers, and security analysts in industries focusing on embedded systems, IoT, and software development.
Course Prerequisites
To ensure you get the most out of this advanced course, you should have:
- A strong command of C programming.
- A basic understanding of digital logic, computer organization, and operating systems.
Detailed 8-Week Course Curriculum
The course is structured to take you from foundational concepts to advanced security paradigms, covering both software and hardware vulnerabilities.
Week 1: Foundations & Buffer Overflow
Introduction to secure systems engineering, using the GNU Debugger (gdb), and understanding the classic yet critical buffer overflow vulnerability.
Week 2: Defending Against Buffer Overflows
Learn modern techniques and mechanisms to prevent and mitigate buffer overflow-based malware, a cornerstone of software security.
Week 3: Advanced Software Vulnerabilities
Explore integer overflows, buffer overreads, and heap overflows, understanding how subtle programming errors can lead to major security breaches.
Week 4: Heap Exploits & Access Control
Dive deeper into sophisticated heap overflow attacks and study fundamental access control models that form the backbone of system security.
Week 5: Confinement
Understand the principles of confinement and sandboxing, techniques used to restrict the capabilities of untrusted code.
Week 6: Trusted Execution Environments (TEEs)
Examine hardware-assisted security with an in-depth look at Intel SGX and ARM TrustZone, technologies enabling secure enclaves for sensitive computations.
Week 7: Micro-architectural Attacks
Investigate cutting-edge threats like Meltdown and Spectre. Learn how side-channels based on execution time and power consumption can leak sensitive information.
Week 8: Hardware Security
Conclude with a focus on hardware root of trust, physical attacks, and countermeasures, understanding security at the most fundamental layer of computing.
Real-World Relevance: Analyzing Major Cyber-Attacks
This course stands out by connecting theory to real-world incidents. You will analyze famous attacks such as:
- Heartbleed: A catastrophic buffer over-read in the OpenSSL library.
- Stagefright: A set of vulnerabilities in Android's media playback engine.
- Meltdown & Spectre: Modern micro-architectural attacks exploiting CPU optimization features.
Industry Support & Applications
The skills imparted in this course are in high demand across the tech industry, particularly in companies developing:
- Embedded Systems and IoT Devices
- Secure Operating Systems & Hypervisors
- Cryptographic Hardware and Software
- Consumer Electronics and Critical Infrastructure
Embark on this 8-week journey with IIT Madras to transform your understanding of system security. Move from being aware of vulnerabilities to actively engineering robust, secure systems capable of withstanding the evolving threat landscape. Enroll today and build the secure digital future.
Enroll Now →