About this Course
11,152 recent views

Course 1 of 1 in the

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 14 hours to complete

English

Subtitles: English
User
Learners taking this Course are
  • Security Engineers
  • Machine Learning Engineers
  • Technical Support Associates
  • Researchers
  • Data Analysts

Skills you will gain

Montgomery Modular MultiplicationSide-Channel AttackHardware DesignCryptographic Hardware
User
Learners taking this Course are
  • Security Engineers
  • Machine Learning Engineers
  • Technical Support Associates
  • Researchers
  • Data Analysts

Course 1 of 1 in the

100% online

Start instantly and learn at your own schedule.

Flexible deadlines

Reset deadlines in accordance to your schedule.

Approx. 14 hours to complete

English

Subtitles: English

Syllabus - What you will learn from this course

Week
1
2 hours to complete

Digital System Design: Basics and Vulnerabilities

7 videos (Total 63 min), 2 readings, 1 quiz
7 videos
Digital System Specification10m
Digital System Implementation9m
Function Simplification and Don't Care Conditions10m
Sequential System Specification8m
Sequential System Implementation7m
Vulnerabilities in Digital Logic Design12m
2 readings
Syllabus10m
Week 1 Overview10m
1 practice exercise
Quiz14m
Week
2
2 hours to complete

Design Intellectual Property Protection

6 videos (Total 78 min), 1 reading, 1 quiz
6 videos
Watermarking Basics8m
Watermarking Examples12m
Good Watermarks15m
Fingerprinting17m
Hardware Metering13m
1 reading
Week 2 Overview10m
1 practice exercise
Quiz22m
Week
3
2 hours to complete

Physical Attacks and Modular Exponentiation

7 videos (Total 80 min), 1 reading, 1 quiz
7 videos
Physical Attacks and Countermeasures 13m
Building Secure Systems 10m
Modular Exponentiation (ME) Basics 6m
ME in Cryptography8m
ME Implementation and Vulnerability14m
Montgomery Reduction11m
1 reading
Week 3 Overview10m
1 practice exercise
Quiz20m
Week
4
2 hours to complete

Side Channel Attacks and Countermeasures

5 videos (Total 86 min), 1 reading, 1 quiz
5 videos
Memory Vulnerabilities and Cache Attacks19m
Power Analysis16m
More Attacks and Countermeasures13m
Modified Modular Exponentiation22m
1 reading
Week 4 Overview10m
1 practice exercise
Quiz30m
4.1
68 ReviewsChevron Right

20%

got a tangible career benefit from this course

25%

got a pay increase or promotion

Top reviews from Hardware Security

By FKAug 3rd 2019

Great course, very helpful. The content is well organised and you need to have all the require knowledge, otherwise you won't get it.

By SRJun 27th 2019

the course is very useful and the content of the course is helpful to learn about hardware security

Instructor

Avatar

Gang Qu

Associate Professor
Electrical and Computer Engineering

About University of Maryland, College Park

The University of Maryland is the state's flagship university and one of the nation's preeminent public research universities. A global leader in research, entrepreneurship and innovation, the university is home to more than 37,000 students, 9,000 faculty and staff, and 250 academic programs. Its faculty includes three Nobel laureates, three Pulitzer Prize winners, 47 members of the national academies and scores of Fulbright scholars. The institution has a $1.8 billion operating budget, secures $500 million annually in external research funding and recently completed a $1 billion fundraising campaign. ...

About the Cybersecurity Specialization

The Cybersecurity Specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. These concepts are illustrated with examples drawn from modern practice, and augmented with hands-on exercises involving relevant tools and techniques. Successful participants will develop a way of thinking that is security-oriented, better understanding how to think about adversaries and how to build systems that defend against them....
Cybersecurity

Frequently Asked Questions

  • Once you enroll for a Certificate, you’ll have access to all videos, quizzes, and programming assignments (if applicable). Peer review assignments can only be submitted and reviewed once your session has begun. If you choose to explore the course without purchasing, you may not be able to access certain assignments.

  • When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile. If you only want to read and view the course content, you can audit the course for free.

More questions? Visit the Learner Help Center.