In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
Offered By
About this Course
11,574 recent views
Flexible deadlines
Reset deadlines in accordance to your schedule.
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Course 4 of 5 in the
Approx. 12 hours to complete
English
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessSkills you will gain
- Montgomery Modular Multiplication
- Side-Channel Attack
- Hardware Design
- Cryptographic Hardware
Flexible deadlines
Reset deadlines in accordance to your schedule.
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Course 4 of 5 in the
Approx. 12 hours to complete
English
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
2 hours to complete
Digital System Design: Basics and Vulnerabilities
2 hours to complete
7 videos (Total 63 min), 2 readings, 1 quiz
2 hours to complete
Design Intellectual Property Protection
2 hours to complete
6 videos (Total 78 min), 1 reading, 1 quiz
2 hours to complete
Physical Attacks and Modular Exponentiation
2 hours to complete
7 videos (Total 80 min), 1 reading, 1 quiz
2 hours to complete
Side Channel Attacks and Countermeasures
2 hours to complete
5 videos (Total 86 min), 1 reading, 1 quiz
Reviews
- 5 stars59.14%
- 4 stars23.52%
- 3 stars10.01%
- 2 stars4.61%
- 1 star2.70%
TOP REVIEWS FROM HARDWARE SECURITY
by ARSep 13, 2019
Indeed learnt a lot about the hardware aspects of security. Thanks Professor.
by DPSep 11, 2020
i will listen and digest once again, the concepts which iam going to apply for my research
by SRJun 26, 2019
the course is very useful and the content of the course is helpful to learn about hardware security
by ISDec 10, 2020
The best course available to learn hardware security theories and impact.
About the Cybersecurity Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.