Security by Design

Learn how to build security into the design, development, and delivery of online products and services with this online course from RMIT University.

Duration

4 weeks

Weekly study

3 hours

100% online

How it works

Unlimited subscription

Learn more

Established

1887

Location

Melbourne, Australia

World ranking

Source: QS World University Rankings 2022

Discover the importance of being Secure by Design with RMIT University

In a digital world where cyber attacks are increasing, Security by Design is crucial in helping to make systems as secure as possible.

On this four-week course from RMIT University, you’ll gain the tools and knowledge to design, develop, and realise online products and services with security at their core.

You’ll master Security by Design principles and learn why security is an important and beneficial aspect of online product and service design and development.

Unpack the CIA triad

With a baseline understanding of the need for security established, you’ll then become familiar with the key security principles and their applications.

You’ll discover the Confidentiality, Integrity, and Availability (CIA) triad, the human-centric security design U3 (user, usage, and usability) concept, and more.

Armed with this knowledge, you’ll be able to identify strategies to implement security in the design of online products and services.

Explore the security threats within the Internet of Things (IoT)

You’ll delve into IoT and the growth of IoT devices to grasp the intricacies of their security and privacy concerns.

This will help you unpack the unique challenges tied to crafting secure IoT applications.

Learn how to embed Security by Design into your organisation

Finally, you’ll learn how to translate your newfound expertise into action within your professional context.

You’ll discover how you can embed Security by Design into the culture, leadership, and practices of your organisation.

By the end, you’ll know how companies can minimise online threats through their design and development as well as by anticipating, detecting, and eliminating security threats before they occur.

  • Week 1

    Why Security by Design matters

    • Introduction

      An introduction to the Security By Design course.

    • What is Security by Design?

      In this Activity, we'll explore why Security by Design matters.

    • Exploring the cyber security ecosystem

      Learn and explore the world of cyber security to understand how Security by Design fits.

    • The benefits of Security by Design

      In this activity, we'll discuss the benefits of Security by Design.

  • Week 2

    The principles of Security by Design

    • Key principles of Security by Design

      In this activity we explore the key principles of Security of Design.

    • Unpacking the principles of Security by Design

      In this activity, we unpack the principles of Security by Design

    • Back to the big question

      In this activity, we go back to the big question.

  • Week 3

    Security by Design in practice: the Internet of Things

    • Security and the Internet of Things

      In this activity we cover security issues and guidelines associated with the Internet of Things.

    • Security issues and guidelines

      In this activity we cover security issues and guidelines

    • IoT device lifecycle

      In this activity we discuss security in IoT device lifecycle - from design to disposal.

  • Week 4

    Security by Design Case Studies

    • Applying Security by Design principles

      In this activity, we discuss applying Security by Design principles.

    • Case study 1

      In this activity, we discuss the Solar Winds hack and Security by Design implications.

    • Case study 2

      In this activity, we discuss the Colonial Pipeline ransomware attack and Security by Design implications.

    • Bringing it all together

      In this activity, we summarise what we have learned and return to the big question posed by this course.

More courses you might like

Learners who joined this course have also enjoyed these courses.

©2025  onlincourse.com. All rights reserved