Security Hardware

Teacher
Siva priya
Category
regular
Duration Time
5 days

ABOUT THE COURSE

Hardware security as a discipline originated out of cryptographic engineering and involves hardware design, access control, secure multi-party computation, secure key storage, ensuring code authenticity, measures to ensure that the supply chain that built the product is secure among other things.

A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server.

A physical entity that is embodied in a physical structure and is easy to evaluate but hard to predict. Further, an individual PUF device must be easy to make but practically impossible to duplicate, even given the exact manufacturing process that produced it. In this respect it is the hardware analog of a one-way function. The name "physical unclonable function" might be a little misleading as some PUFs are clonable, and most PUFs are noisy and therefore do not achieve the requirements for a function. Today, PUFs are usually implemented in integrated circuits and are typically used in applications with high security requirements.

CODE OF ETHICS - EC-Council


What You Will Learn

The following tables list Microsoft Certifications by name and describe how they enable IT professionals to display and validate their skills and experience.

Key Features


20 hours of high quality eLearning content
What You Will Learn
Achievements in work
72 end of chapter quizzes
CD's
Participation Certificate

topics covered


SECURITY HARDWARE

Module 01: Introduction
Module 02: Descriptioin
Module 03: Computer compatibility
Module 04: Fingerprint
Module 05: Differential power analysis
Module 06: Supply chain security
Module 07: List of computer hardware manufacturers
Module 08: Consumer protection
Module 09: Security switch
Module 10: Hardware security module
Module 11: Summary
Module 12: Application