Best Cyber Security practices for ICS and ITS.
Lab-based learning on UVM structure, syntax, and testbench design.
Explored various DFT methodologies.
Learned to write clean and expressive assertions.
Learned key cybersecurity tools and defense strategies.
Studied Solidity and blockchain architecture.
Designed and deployed contracts with real logic.
Used SQL to explore and visualize astronomy datasets.