In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
Offered By
About this Course
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessSkills you will gain
- Montgomery Modular Multiplication
- Side-Channel Attack
- Hardware Design
- Cryptographic Hardware
Could your company benefit from training employees on in-demand skills?
Try Coursera for BusinessOffered by
Syllabus - What you will learn from this course
Digital System Design: Basics and Vulnerabilities
Design Intellectual Property Protection
Physical Attacks and Modular Exponentiation
Side Channel Attacks and Countermeasures
Reviews
- 5 stars59.11%
- 4 stars23.45%
- 3 stars9.98%
- 2 stars4.75%
- 1 star2.69%
TOP REVIEWS FROM HARDWARE SECURITY
This is not a class for a non-computer scientist or a non-electrical engineer. It's frustrating to learn the material this way, but the information is valuable.
i will listen and digest once again, the concepts which iam going to apply for my research
It was a very nice course. Lots of exposure was given to mathematical ways of analyzing threat.
the course is very useful and the content of the course is helpful to learn about hardware security
About the Cybersecurity Specialization

Frequently Asked Questions
When will I have access to the lectures and assignments?
What will I get if I subscribe to this Specialization?
Is financial aid available?
More questions? Visit the Learner Help Center.