In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
Offered By
About this Course
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessSkills you will gain
- Montgomery Modular Multiplication
- Side-Channel Attack
- Hardware Design
- Cryptographic Hardware
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
Digital System Design: Basics and Vulnerabilities
Design Intellectual Property Protection
Physical Attacks and Modular Exponentiation
Side Channel Attacks and Countermeasures
Reviews
- 5 stars59.30%
- 4 stars23.34%
- 3 stars9.93%
- 2 stars4.73%
- 1 star2.68%
TOP REVIEWS FROM HARDWARE SECURITY
Very good course but math portion should have more clear explanation. Some easy part is over explained where some hard part is less explained. Overall it's a good course.
Pretty good course, I enjoyed taking it. Suggest recommending texts for the course other than papers listed.
Great course, very helpful. The content is well organised and you need to have all the require knowledge, otherwise you won't get it.
It was a very nice course. Lots of exposure was given to mathematical ways of analyzing threat.
About the Cybersecurity Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.