Duration
4 weeksWeekly study
3 hours100% online
How it works
Security by Design
Discover the importance of being Secure by Design with RMIT University
In a digital world where cyber attacks are increasing, Security by Design is crucial in helping to make systems as secure as possible.
On this four-week course from RMIT University, you’ll gain the tools and knowledge to design, develop, and realise online products and services with security at their core.
You’ll master Security by Design principles and learn why security is an important and beneficial aspect of online product and service design and development.
Unpack the CIA triad
With a baseline understanding of the need for security established, you’ll then become familiar with the key security principles and their applications.
You’ll discover the Confidentiality, Integrity, and Availability (CIA) triad, the human-centric security design U3 (user, usage, and usability) concept, and more.
Armed with this knowledge, you’ll be able to identify strategies to implement security in the design of online products and services.
Explore the security threats within the Internet of Things (IoT)
You’ll delve into IoT and the growth of IoT devices to grasp the intricacies of their security and privacy concerns.
This will help you unpack the unique challenges tied to crafting secure IoT applications.
Learn how to embed Security by Design into your organisation
Finally, you’ll learn how to translate your newfound expertise into action within your professional context.
You’ll discover how you can embed Security by Design into the culture, leadership, and practices of your organisation.
By the end, you’ll know how companies can minimise online threats through their design and development as well as by anticipating, detecting, and eliminating security threats before they occur.
Syllabus
Week 1
Why Security by Design matters
Introduction
An introduction to the Security By Design course.
What is Security by Design?
In this Activity, we'll explore why Security by Design matters.
Exploring the cyber security ecosystem
Learn and explore the world of cyber security to understand how Security by Design fits.
The benefits of Security by Design
In this activity, we'll discuss the benefits of Security by Design.
Week 2
The principles of Security by Design
Key principles of Security by Design
In this activity we explore the key principles of Security of Design.
Unpacking the principles of Security by Design
In this activity, we unpack the principles of Security by Design
Back to the big question
In this activity, we go back to the big question.
Week 3
Security by Design in practice: the Internet of Things
Security and the Internet of Things
In this activity we cover security issues and guidelines associated with the Internet of Things.
Security issues and guidelines
In this activity we cover security issues and guidelines
IoT device lifecycle
In this activity we discuss security in IoT device lifecycle - from design to disposal.
Week 4
Security by Design Case Studies
Applying Security by Design principles
In this activity, we discuss applying Security by Design principles.
Case study 1
In this activity, we discuss the Solar Winds hack and Security by Design implications.
Case study 2
In this activity, we discuss the Colonial Pipeline ransomware attack and Security by Design implications.
Bringing it all together
In this activity, we summarise what we have learned and return to the big question posed by this course.
When would you like to start?
Start straight away and join a global classroom of learners. If the course hasn’t started yet you’ll see the future date listed below.
Available now
Learning on this course
On every step of the course you can meet other learners, share your ideas and join in with active discussions in the comments.
What will you achieve?
By the end of the course, you‘ll be able to...
- Position Security by Design at the centre of the design and development of online products and services.
- Identify the ways technology companies can minimise online threats through the design and development of online products and services and by anticipating, detecting and eliminating security threats before they occur.
- Embed Security by Design into the culture, leadership and practices of the organisation.
- Describe the application of Security by Design principles to online products and services.
Who is the course for?
This course is designed for anyone interested in understanding the importance of embedding Security by Design into the design, development and delivery of online products and services.
It will be particularly beneficial for:
• Those with an interest in designing and developing online products and services
• IT personnel involved in online product and service design, development, and delivery
• Educators involved in upskilling students on technology design and online security
• Anyone with an interest in technology policy
Who will you learn with?
Matthew Warren is the Director of the RMIT University Centre of Cyber Security Research and Innovation (CCSRI) and a Professor of Cyber Security at RMIT University, Australia.
Centre for Cyber Security Research and Innovation
The RMIT University Centre for Cyber Security Research and Innovation (CCSRI) is an award-winning centre with a multi-disciplinary and applied approach to research, education and innovation within cyber security, considering the human, organisational and technological aspects of the field.
Ways to learn | Subscribe & save | Buy this course | Limited access |
---|---|---|---|
Choose the best way to learn for you! | $349.99 for one year Automatically renews | $109/one-off payment | Free |
Develop skills to further your career | Fulfill your current learning need | Sample the course materials | |
Access to this course | tick | tick | Access expires 9 Dec 2024 |
Access to 1,000+ courses | tick | cross | cross |
Learn at your own pace | tick | tick | cross |
Discuss your learning in comments | tick | tick | tick |
Tests to check your learning | tick | tick | cross |
Certificate when you're eligible | Digital only | Printed and digital | cross |
Cancel for free anytime |
Ways to learn
Choose the best way to learn for you!
Buy this course
$109/one-off payment
Fulfill your current learning need
- Access to this course
- Learn at your own pace
- Discuss your learning in comments
- Tests to boost your learning
- Printed and digital certificate when you’re eligible
Subscribe & save
$349.99 for one year
Automatically renews
Develop skills to further your career
- Access to this course
- Access to 1,000+ courses
- Learn at your own pace
- Discuss your learning in comments
- Tests to boost your learning
- Digital certificate when you're eligible
Cancel for free anytime
Limited access
Free
Sample the course materials
- Access expires 9 Dec 2024
Find out more about certificates, Unlimited or buying a course (Upgrades) |
Find out more about certificates, Unlimited or buying a course (Upgrades)
Learning on FutureLearn
Your learning, your rules
- Courses are split into weeks, activities, and steps to help you keep track of your learning
- Learn through a mix of bite-sized videos, long- and short-form articles, audio, and practical activities
- Stay motivated by using the Progress page to keep track of your step completion and assessment scores
Join a global classroom
- Experience the power of social learning, and get inspired by an international network of learners
- Share ideas with your peers and course educators on every step of the course
- Join the conversation by reading, @ing, liking, bookmarking, and replying to comments from others
Map your progress
- As you work through the course, use notifications and the Progress page to guide your learning
- Whenever you’re ready, mark each step as complete, you’re in control
- Complete 90% of course steps and all of the assessments to earn your certificate
Want to know more about learning on FutureLearn? Using FutureLearn
Do you know someone who'd love this course? Tell them about it...
More courses you might like
Learners who joined this course have also enjoyed these courses.
Browse more in Business & Management and IT & Computer Science