In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
Offered By
About this Course
11,285 recent views
Flexible deadlines
Reset deadlines in accordance to your schedule.
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Course 4 of 5 in the
Approx. 12 hours to complete
English
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessSkills you will gain
- Montgomery Modular Multiplication
- Side-Channel Attack
- Hardware Design
- Cryptographic Hardware
Flexible deadlines
Reset deadlines in accordance to your schedule.
Shareable Certificate
Earn a Certificate upon completion
100% online
Start instantly and learn at your own schedule.
Course 4 of 5 in the
Approx. 12 hours to complete
English
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
2 hours to complete
Digital System Design: Basics and Vulnerabilities
2 hours to complete
7 videos (Total 63 min), 2 readings, 1 quiz
2 hours to complete
Design Intellectual Property Protection
2 hours to complete
6 videos (Total 78 min), 1 reading, 1 quiz
2 hours to complete
Physical Attacks and Modular Exponentiation
2 hours to complete
7 videos (Total 80 min), 1 reading, 1 quiz
2 hours to complete
Side Channel Attacks and Countermeasures
2 hours to complete
5 videos (Total 86 min), 1 reading, 1 quiz
Reviews
- 5 stars59.20%
- 4 stars23.49%
- 3 stars10%
- 2 stars4.60%
- 1 star2.69%
TOP REVIEWS FROM HARDWARE SECURITY
by VPSep 25, 2020
The course content was really appropriate and loved the way of teaching of Professor
by MDApr 4, 2021
Pretty good course, I enjoyed taking it. Suggest recommending texts for the course other than papers listed.
by DPSep 11, 2020
i will listen and digest once again, the concepts which iam going to apply for my research
by ARFeb 10, 2017
It was a very nice course. Lots of exposure was given to mathematical ways of analyzing threat.
About the Cybersecurity Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.