Please be aware that our registration system works best when you are using Chrome. If you receive an error, please ensure you are using the most up to date version of that browser. This error may occur during the payment step of the registration process.
Design for Security
This course will provide you with a better understanding of how security principles should be integrated into operations once an application or cyber system has been deployed into production. To begin, we will provide an overview of the cyber threat landscape and discuss general frameworks for conceptualizing intrusions and defenses. Topics include both proactive (e.g., monitoring, patching) and reactive (e.g., incident response) processes, as well as approaches to end-of-life processes such as decommissioning and disposal. As part of the course, you will also learn about the current legislative and regulatory environment within which production systems operate, such as laws governing data privacy and security controls. While we focus primarily on the United States, companies increasingly operate across national boundaries, so we will also discuss relevant international regulations, directives, and agreements. Finally, we will examine risk assessment and risk management as a framework for navigating the economic tradeoffs associated with securing operations.
Registration in this course is subject to the Purdue University Online Non-Credit Policies.
No sections currently available.