Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

RMIT University

Security by Design

RMIT University via FutureLearn

Overview

Discover the importance of being Secure by Design with RMIT University

In a digital world where cyber attacks are increasing, Security by Design is crucial in helping to make systems as secure as possible.

On this four-week course from RMIT University, you’ll gain the tools and knowledge to design, develop, and realise online products and services with security at their core.

You’ll master Security by Design principles and learn why security is an important and beneficial aspect of online product and service design and development.

Unpack the CIA triad

With a baseline understanding of the need for security established, you’ll then become familiar with the key security principles and their applications.

You’ll discover the Confidentiality, Integrity, and Availability (CIA) triad, the human-centric security design U3 (user, usage, and usability) concept, and more.

Armed with this knowledge, you’ll be able to identify strategies to implement security in the design of online products and services.

Explore the security threats within the Internet of Things (IoT)

You’ll delve into IoT and the growth of IoT devices to grasp the intricacies of their security and privacy concerns.

This will help you unpack the unique challenges tied to crafting secure IoT applications.

Learn how to embed Security by Design into your organisation

Finally, you’ll learn how to translate your newfound expertise into action within your professional context.

You’ll discover how you can embed Security by Design into the culture, leadership, and practices of your organisation.

By the end, you’ll know how companies can minimise online threats through their design and development as well as by anticipating, detecting, and eliminating security threats before they occur.

This course is designed for anyone interested in understanding the importance of embedding Security by Design into the design, development and delivery of online products and services.

It will be particularly beneficial for:

• Those with an interest in designing and developing online products and services

• IT personnel involved in online product and service design, development, and delivery

• Educators involved in upskilling students on technology design and online security

• Anyone with an interest in technology policy

Syllabus

  • Why Security by Design matters
    • Introduction
    • What is Security by Design?
    • Exploring the cyber security ecosystem
    • The benefits of Security by Design
  • The principles of Security by Design
    • Key principles of Security by Design
    • Unpacking the principles of Security by Design
    • Back to the big question
  • Security by Design in practice: the Internet of Things
    • Security and the Internet of Things
    • Security issues and guidelines
    • IoT device lifecycle
  • Security by Design Case Studies
    • Applying Security by Design principles
    • Case study 1
    • Case study 2
    • Bringing it all together

Taught by

Stuart Thomas

Reviews

Start your review of Security by Design

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.