You must be logged in to take this course → LOGIN | REGISTER NOW
The goal of this course is to provide you with a broad and multi-disciplinary perspective on current topics in cybersecurity. A complete secured website requires four things
- Software
- Hardware
- iii. Cryptography and
- Usability.
You will learn about Integrated Circuits and the systems embedded in a hardware device and discuss the vulnerabilities, threats and hardware design security and how to develop the security system in this course.
Assessment
This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.
Certification
Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.
Having an Official Edukite Certification is a great way to celebrate and share your success. You can:
- Add the certificate to your CV or resume and brighten up your career
- Show it to prove your success
Course Curriculum
Module 01 | |||
Hardware security – Introduction | 00:05:00 | ||
Hardware security – Digital System Specification | 00:10:00 | ||
Hardware security – Digital System Implementation | 00:09:00 | ||
Hardware security – Function Simplification and Don ‘t Care Conditions | 00:10:00 | ||
Hardware security – Sequential System Specification | 00:09:00 | ||
Hardware security – Sequential System Implementation | 00:07:00 | ||
Hardware security – Vulnerabilities in Digital Logic Design | 00:12:00 | ||
Hardware security – Introduction to IP Protection | 00:11:00 | ||
Hardware security – Watermarking Basics | 00:08:00 | ||
Hardware security – Watermarking Examples | 00:13:00 | ||
Hardware security – Good Watermarks | 00:15:00 | ||
Hardware security – Fingerprinting | 00:17:00 | ||
Module 02 | |||
Hardware security – Hardware Metering | 00:13:00 | ||
Hardware security – Physical Attacks PA Basics | 00:15:00 | ||
Hardware security – Physical Attacks and Countermeasures | 00:14:00 | ||
Hardware security – Building Secure Systems | 00:10:00 | ||
Hardware security – Modular Exponentiation ME Basics | 00:06:00 | ||
Hardware security – ME in Cryptography | 00:09:00 | ||
Hardware security – ME Implementation and Vulnerability | 00:14:00 | ||
Hardware security – Montgomery Reduction | 00:12:00 | ||
Hardware security – Introduction to Side Channel Attacks | 00:14:00 | ||
Hardware security – Memory Vulnerabilities and Cache Attacks | 00:20:00 | ||
Hardware security – Power Analysis | 00:16:00 | ||
Hardware security – More Attacks and Countermeasures | 00:13:00 | ||
Module 03 | |||
Hardware security – Modified Modular Exponentiation | 00:23:00 | ||
Hardware security – Hardware Trojan HT and Trusted IC | 00:18:00 | ||
Hardware security – Hardware Trojan Taxonomy | 00:15:00 | ||
Hardware security – Hardware Trojan Detection Overview | 00:17:00 | ||
Hardware security – Hardware Trojan Detection Methods | 00:14:00 | ||
Hardware security – Trusted IC Design with HT Prevention | 00:17:00 | ||
Hardware security – Trust Platform Module and Other Good Practices | 00:09:00 | ||
Hardware security – Physical Unclonable Functions PUF Basics | 00:16:00 | ||
Hardware security – RO PUF Reliability | 00:08:00 | ||
Hardware security – FPGA Implementation of Crypto | 00:14:00 | ||
Hardware security – Vulnerabilities and Countermeasures in FPGA Systems | 00:10:00 | ||
Hardware security – Role of Hardware in Security and Trust | 00:06:00 | ||
Assessment | |||
Submit Your Assignment | 00:00:00 | ||
Certification | 00:00:00 |
Course Reviews
No Reviews found for this course.