Course

Hardware Security

University of Maryland, College Park

Explore the critical aspects of hardware security in the "Hardware Security" course. Gain insights into vulnerabilities in digital system design, IP protection, physical attacks, side channel attacks, hardware trojan detection, and trusted IC design, while also delving into emerging technologies and best practices.

Throughout the course, you will cover topics such as digital system design, intellectual property protection, physical attacks and modular exponentiation, side channel attacks and countermeasures, hardware trojan detection, trusted IC design, and emerging technologies. Each module is designed to provide a deep understanding of the hardware security landscape, ensuring that you are equipped with the knowledge and tools to build secure and trusted hardware systems.

Certificate Available ✔

Get Started / More Info
Hardware Security
Course Modules

Dive into hardware security through modules covering digital system vulnerabilities, IP protection, physical attacks, side channel attacks, hardware trojan detection, trusted IC design, and emerging technologies.

Digital System Design: Basics and Vulnerabilities

This module delves into vulnerabilities in digital system design, covering topics such as digital system specification, implementation, function simplification, sequential system specification, and vulnerabilities in digital logic design. The focus is on understanding the basics and potential vulnerabilities in digital system design.

Design Intellectual Property Protection

Explore the essentials of design intellectual property protection in this module. Gain knowledge about IP protection, watermarking, fingerprinting, hardware metering, and the importance of protecting design intellectual property.

Physical Attacks and Modular Exponentiation

Uncover the world of physical attacks and modular exponentiation in this module. Understand physical attacks, countermeasures, secure system building, modular exponentiation in cryptography, implementation, vulnerability, and Montgomery reduction.

Side Channel Attacks and Countermeasures

This module focuses on side channel attacks, including memory vulnerabilities, cache attacks, power analysis, and countermeasures. The discussion also extends to modified modular exponentiation and associated countermeasures.

Hardware Trojan Detection and Trusted IC Design

Discover hardware trojan detection and trusted IC design in this module, covering hardware trojan taxonomy, detection overview, methods, and trusted IC design with hardware trojan prevention. Gain insight into the critical aspects of hardware trojan detection and trusted IC design.

Good Practice and Emerging Technologies

Gain knowledge about FPGA implementation of cryptography, vulnerabilities, and countermeasures in FPGA systems, the role of hardware in security and trust, as well as physical unclonable functions (PUF) basics, RO PUF, and good practices in this module.

Final Exam

Prepare for the final exam by revisiting the key concepts covered throughout the course, ensuring a comprehensive understanding of hardware security.

More Computer Security and Networks Courses

Exam Prep: AWS Certified Advanced Networking Specialty

Whizlabs

Prepare for AWS Certified Advanced Networking Specialty with a comprehensive specialization covering routing, switching, security, and more.

Assets, Threats, and Vulnerabilities

Google

This course explores assets, threats, and vulnerabilities in cybersecurity. Learn to classify assets, analyze risks, and identify threats. Develop an attacker mindset...

Cyber Security – Technology and Governance

University of London

Prepare for a comprehensive exploration of cyber security, technology, and governance in this specialized course, covering computer system security, network security,...

Ressources numériques, menaces et vulnérabilités

Google

Ressources numériques, menaces et vulnérabilités course provides essential skills for entry-level cybersecurity jobs, covering resource classification, threat...