Cyber Security Courses: Design for Security Program

Design for Security header image

The world is becoming increasingly more connected and convenient with digital technologies such as the Cloud, Big Data, mobile, Internet of Things, and Artificial Intelligence. But this convenience leads to greater challenges in security, compliance, data protection, regulations, and privacy – and greater costs.* For our protection, security can no longer be just an afterthought.

Today there are more than 300,000 cybersecurity job openings*. To meet the growing demand, Purdue University and Intel are collaborating to offer a new “Design for Security” program led by Purdue’s School of Industrial Engineering and Purdue Online Learning. (Register here.)

“Design for Security” focuses on both on the production level – those companies that produce cyber or cyber-physical systems and their components – and on the education level – those universities that produce the engineers and scientists who design the cyber or cyber-physical systems and associated processes. 

This cyber security program covers design for security principles from the physical secure design of the infrastructure, to the security of the hardware and software that underlie the infrastructure, and then to the technical constraints and processes in place to support operational security. It introduces security principles that are required to design a system that supports and enforces the necessary authentication, authorization, confidentiality, data integrity, accountability, availability, and non-repudiation requirements, even when the system is under attack. It demonstrates the importance of taking security into account throughout the secure development lifecycle, not just in the implementation and deployment phases.

The program is open to all STEM disciplines but designed specifically for technical professionals, working engineers, and students with an awareness of secure design. This digital badge program includes multiple online courses to deal with the complexities of designing and manufacturing components and products that will be delivered and integrated into secure customer solutions. These courses will allow individuals to benefit by gaining advanced knowledge that could be applied immediately to their current roles, projects, and initiatives where they could incorporate security from the onset while learning occurs in a flexible online environment.

Four Foundational Courses

1. Foundations of Secure Development - Professor Baijian Yang, CIT

2. Secure Design Lifecycle - Professor Shreyas Sen, Engineering

3. Secure Operations - Professor David Johnson, Engineering

4. Security Applications - Professor Vaneet Aggarwal, Engineering

Click here to register.  These flexible online courses are designed so learners may complete the courses in as few as four weeks, or they may choose to use the allotted eight weeks that the course is available.

Tentative Future Elective Courses

  1. Databases
  2. Web Security
  3. Apps
  4. Net Security
  5. Off-site Storage (including intro to Cloud Security)
  6. AI/ML/Big Data Analytics as a security concern and “tool”
  7. IoT/cyber-physical
  8. Autonomous Vehicles, UAS
  9. Block Chain
  10. Quantum Computing


*There are over 300,000 cybersecurity job openings on a national level, estimated by Cyberseek. Security issues have cost businesses, consumers, and governments significantly in recent years. The 2017 Identity Fraud Study, released by Javelin Strategy & Research, found that $16 billion was stolen from 15.4 million U.S. consumers in 2016, compared with $15.3 billion and 13.1 million victims just a year earlier. Identity thieves have stolen over $107 billion in the past six years. According to Invesp, the e-commerce industry suffered an estimated revenue loss of $6.7 billion due to chargebacks in 2016, of which 71% ($4.8b) was due to friendly/chargeback fraud. Global Fraud Index notes the value of potential fraud in the eight industries studied as $57.8 billion. In 2016, computer viruses were estimated to have cost the global economy over $450 billion (around 0.5% of the world’s economy). As computing systems pervade various aspects of our daily lives, capturing, storing, accessing, and manipulating a wide range of sensitive personal data, security will become a daunting challenge, and will bring into question the viability of many future electronic products, applications, and services.