Our Purdue Online team has been directed to continue to work remotely. We regret that this may cause some delay in our shipping and response time. You can still reach us at 765-494-0959 and email@example.com
. We appreciate your patience and understanding, and we will do our very best to offer quality, timely service to you.
Design for Security
This course will provide you with a better understanding of how security principles should be integrated into operations once an application or cyber system has been deployed into production. To begin, we will provide an overview of the cyber threat landscape and discuss general frameworks for conceptualizing intrusions and defenses. Topics include both proactive (e.g., monitoring, patching) and reactive (e.g., incident response) processes, as well as approaches to end-of-life processes such as decommissioning and disposal. As part of the course, you will also learn about the current legislative and regulatory environment within which production systems operate, such as laws governing data privacy and security controls. While we focus primarily on the United States, companies increasingly operate across national boundaries, so we will also discuss relevant international regulations, directives, and agreements. Finally, we will examine risk assessment and risk management as a framework for navigating the economic tradeoffs associated with securing operations.
Registration in this course is subject to the Purdue Online Non-Credit Policies.
No sections currently available.