In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
This course is part of the Cybersecurity Specialization
About this Course
Skills you will gain
- Montgomery Modular Multiplication
- Side-Channel Attack
- Hardware Design
- Cryptographic Hardware
Syllabus - What you will learn from this course
Digital System Design: Basics and Vulnerabilities
Design Intellectual Property Protection
Physical Attacks and Modular Exponentiation
Side Channel Attacks and Countermeasures
- 5 stars59.30%
- 4 stars23.34%
- 3 stars9.93%
- 2 stars4.73%
- 1 star2.68%
TOP REVIEWS FROM HARDWARE SECURITY
Very good course but math portion should have more clear explanation. Some easy part is over explained where some hard part is less explained. Overall it's a good course.
Pretty good course, I enjoyed taking it. Suggest recommending texts for the course other than papers listed.
Great course, very helpful. The content is well organised and you need to have all the require knowledge, otherwise you won't get it.
It was a very nice course. Lots of exposure was given to mathematical ways of analyzing threat.
About the Cybersecurity Specialization
Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.