- Exploitation techniques
- Systems Design
- Computer Hardware
- Technical Design
- Encryption
- Cryptography
- Hardware Architecture
- Hardware Design
- Security Engineering
- Exploit development
- Emerging Technologies
- Threat Modeling
Hardware Security
Completed by BASSANT AYMAN SHAARAWY AHMED
June 29, 2017
12 hours (approximately)
BASSANT AYMAN SHAARAWY AHMED's account is verified. Coursera certifies their successful completion of Hardware Security
Skills you will gain

