• LOGIN
  • No products in the cart.

You must be logged in to take this course  →   LOGIN | REGISTER NOW

The goal of this course is to provide you with a broad and multi-disciplinary perspective on current topics in cybersecurity. A complete secured website requires four things

  1.    Software
  2.   Hardware
  3. iii.  Cryptography and
  4.   Usability.

You will learn about Integrated Circuits and the systems embedded in a hardware device and discuss the vulnerabilities, threats and hardware design security and how to develop the security system in this course.

Assessment

This course does not involve any written exams. Students need to answer 5 assignment questions to complete the course, the answers will be in the form of written work in pdf or word. Students can write the answers in their own time. Each answer needs to be 200 words (1 Page). Once the answers are submitted, the tutor will check and assess the work.

Certification

Edukite courses are free to study. To successfully complete a course you must submit all the assignment of the course as part of the assessment. Upon successful completion of a course, you can choose to make your achievement formal by obtaining your Certificate at a cost of £49.

Having an Official Edukite Certification is a great way to celebrate and share your success. You can:

  • Add the certificate to your CV or resume and brighten up your career
  • Show it to prove your success

Course Curriculum

Module 01
Hardware security – Introduction 00:05:00
Hardware security – Digital System Specification 00:10:00
Hardware security – Digital System Implementation 00:09:00
Hardware security – Function Simplification and Don ‘t Care Conditions 00:10:00
Hardware security – Sequential System Specification 00:09:00
Hardware security – Sequential System Implementation 00:07:00
Hardware security – Vulnerabilities in Digital Logic Design 00:12:00
Hardware security – Introduction to IP Protection 00:11:00
Hardware security – Watermarking Basics 00:08:00
Hardware security – Watermarking Examples 00:13:00
Hardware security – Good Watermarks 00:15:00
Hardware security – Fingerprinting 00:17:00
Module 02
Hardware security – Hardware Metering 00:13:00
Hardware security – Physical Attacks PA Basics 00:15:00
Hardware security – Physical Attacks and Countermeasures 00:14:00
Hardware security – Building Secure Systems 00:10:00
Hardware security – Modular Exponentiation ME Basics 00:06:00
Hardware security – ME in Cryptography 00:09:00
Hardware security – ME Implementation and Vulnerability 00:14:00
Hardware security – Montgomery Reduction 00:12:00
Hardware security – Introduction to Side Channel Attacks 00:14:00
Hardware security – Memory Vulnerabilities and Cache Attacks 00:20:00
Hardware security – Power Analysis 00:16:00
Hardware security – More Attacks and Countermeasures 00:13:00
Module 03
Hardware security – Modified Modular Exponentiation 00:23:00
Hardware security – Hardware Trojan HT and Trusted IC 00:18:00
Hardware security – Hardware Trojan Taxonomy 00:15:00
Hardware security – Hardware Trojan Detection Overview 00:17:00
Hardware security – Hardware Trojan Detection Methods 00:14:00
Hardware security – Trusted IC Design with HT Prevention 00:17:00
Hardware security – Trust Platform Module and Other Good Practices 00:09:00
Hardware security – Physical Unclonable Functions PUF Basics 00:16:00
Hardware security – RO PUF Reliability 00:08:00
Hardware security – FPGA Implementation of Crypto 00:14:00
Hardware security – Vulnerabilities and Countermeasures in FPGA Systems 00:10:00
Hardware security – Role of Hardware in Security and Trust 00:06:00
Assessment
Submit Your Assignment 00:00:00
Certification 00:00:00

Course Reviews

4.7

4.7
9 ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

574 STUDENTS ENROLLED
©2021 Edukite. All Rights Resereved
Edukite is A Part Of Ebrahim College, Charity Commission
Reg No 110841