Chevron Left
Retour à Sécurité du matériel informatique

Avis et commentaires pour d'étudiants pour Sécurité du matériel informatique par Université du Maryland, College Park

4.2
étoiles
514 évaluations
96 avis

À propos du cours

In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware....

Meilleurs avis

FK
2 août 2019

Great course, very helpful. The content is well organised and you need to have all the require knowledge, otherwise you won't get it.

XZ
30 mars 2020

Excellent course. I like it, and it is very straightforward and easy to understand. I hope to see more courses from this professor.

Filtrer par :

26 - 50 sur 94 Avis pour Sécurité du matériel informatique

par charmi d

27 nov. 2020

it was good & pretty simple good for beginners

par francesco m

11 avr. 2017

I enjoyed this course and I learn many things

par NAGARAJU P

8 oct. 2020

really wonderful course

Thanks to Coursera

par Surbhi C

15 juil. 2019

Extremely Helpful for Scholars, students.

par ALOK . M

28 nov. 2020

Nice i had learned so much thank you

par Ahmed k

16 juil. 2020

Thanks for the fantastic materials.

par Enrique A M

1 oct. 2020

Mil Gracias Coursera.

par AlladiSaiteja

17 mars 2019

nice and superb!!!!

par amin b

28 avr. 2020

very insightful

par Naresh B

2 sept. 2020

great course.

par NAVEEN A M

9 sept. 2020

good course

par Iqbal U K

6 oct. 2020

Good One!

par Priyanga

24 mars 2018

Good..!!!

par mohamed h a

7 août 2017

thank you

par Breno O d S

31 juil. 2017

Great !!!

par Natthachai C

23 mai 2017

Excellent

par Harrison A

2 nov. 2020

Great

par Fhareza A

21 sept. 2020

wow

par Rattan k

14 mai 2019

NA

par Will B

21 sept. 2017

The presentation style is dry but straightforward. Material is excellent, and the lecturer can speak authoritatively about it. In Weeks 4 and 5, Montgomery reductions are presented without much mathematical background, which means you'll need to go figure out Euclidean division, Bezout's identity, etc. on your own. Not recommended for people without a background in CS, electrical engineering, or math.

par Stanislav B

11 oct. 2020

The course added a lot and structured better my knowledge of hardware security.

There are some disadvantages - e.g. low level volume on some videos, no downloadable slides, some mathematical proofs do not add much to the subject, etc., but they are not critical.

While the course is relatively old, it still covers pretty well the current state of hardware vulnerabilities.

par Muhammad F

14 juil. 2019

An excellent course to learn about Hardware security architecture. Instructor elaborates well what are threats to hardware security i-e hardware trojan, passive attacks and side channel attacks.He describes well to preserve and secure hardware intellectual property(IP) by using different techniques.

par Pavan R

20 avr. 2017

Course contents was good , assignments were challenging . One suggestion is to provide pdf for each classroom session or may be a weekly pdf would be great , It so happened that attending each quiz without pdf it was hard to search from video/transcript back and forth

par Ajedra K

15 août 2020

It is really a helpful course which has helped to refresh my college knowledge and added a lot more new things to my understanding and i believe I am competent in this area of hardware securing how to protect against it and look for loop holes in my system

par Zilu T

19 oct. 2016

It is a great intro course with very rich information about hardware security. But just as some other students have mentioned, the difficulty level of each assignment is not well balanced, and Week 6 videos are out of order.