Hardware Security

About this Course

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.

Created by: University of Maryland, College Park


Related Online Courses

This course covers Network Function Virtualization from the perspective of a systems engineer. It first discusses the proliferation of middleboxes in enterprise networks and the necessity of... more
In 2020 the world will generate 50 times the amount of data as in 2011. And 75 times the number of information sources (IDC, 2011). Being able to use this data provides huge opportunities and to... more
By the end of this second course in the Total Data Quality Specialization, learners will be able to: 1. Learn various metrics for evaluating Total Data Quality (TDQ) at each stage of the TDQ... more
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you learn how to migrate MySQL user data when running Database Migration Service jobs. First, you identify the... more
The Advanced Kubernetes - Securing, Monitoring, and Scaling Kubernetes Clusters course is designed for individuals who want to gain expertise in securing, monitoring, and efficiently managing... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL