- System Design and Implementation
- Encryption
- Computer Hardware
- Exploit development
- Threat Detection
- Application Specific Integrated Circuits
- Threat Modeling
- Cybersecurity
- Technical Design
- Hardware Design
- Exploitation techniques
- Hardware Architecture
Hardware Security
Completed by BASSANT AYMAN SHAARAWY AHMED
June 29, 2017
12 hours (approximately)
BASSANT AYMAN SHAARAWY AHMED's account is verified. Coursera certifies their successful completion of Hardware Security
Skills you will gain

