Security by Design
Learn how to build security into the design, development, and delivery of online products and services with this online course from RMIT University.
Duration
4 weeks
Weekly study
3 hours
100% online
How it works
Unlimited subscription
Learn more
Established
1887
Location
Melbourne, Australia
World ranking
Source: QS World University Rankings 2022
In a digital world where cyber attacks are increasing, Security by Design is crucial in helping to make systems as secure as possible.
On this four-week course from RMIT University, you’ll gain the tools and knowledge to design, develop, and realise online products and services with security at their core.
You’ll master Security by Design principles and learn why security is an important and beneficial aspect of online product and service design and development.
With a baseline understanding of the need for security established, you’ll then become familiar with the key security principles and their applications.
You’ll discover the Confidentiality, Integrity, and Availability (CIA) triad, the human-centric security design U3 (user, usage, and usability) concept, and more.
Armed with this knowledge, you’ll be able to identify strategies to implement security in the design of online products and services.
You’ll delve into IoT and the growth of IoT devices to grasp the intricacies of their security and privacy concerns.
This will help you unpack the unique challenges tied to crafting secure IoT applications.
Finally, you’ll learn how to translate your newfound expertise into action within your professional context.
You’ll discover how you can embed Security by Design into the culture, leadership, and practices of your organisation.
By the end, you’ll know how companies can minimise online threats through their design and development as well as by anticipating, detecting, and eliminating security threats before they occur.
An introduction to the Security By Design course.
In this Activity, we'll explore why Security by Design matters.
Learn and explore the world of cyber security to understand how Security by Design fits.
In this activity, we'll discuss the benefits of Security by Design.
In this activity we explore the key principles of Security of Design.
In this activity, we unpack the principles of Security by Design
In this activity, we go back to the big question.
In this activity we cover security issues and guidelines associated with the Internet of Things.
In this activity we cover security issues and guidelines
In this activity we discuss security in IoT device lifecycle - from design to disposal.
In this activity, we discuss applying Security by Design principles.
In this activity, we discuss the Solar Winds hack and Security by Design implications.
In this activity, we discuss the Colonial Pipeline ransomware attack and Security by Design implications.
In this activity, we summarise what we have learned and return to the big question posed by this course.
More courses you might like
Learners who joined this course have also enjoyed these courses.
©2025 onlincourse.com. All rights reserved