Security Applications


Credit Hours:


Learning Objective:

This is the fourth foundational course in the Design for Security Badge program. This course introduces different example applications to illustrate the secure design principles from the physical secure design of the infrastructure, to the security of the hardware and software that underlie the infrastructure, and then to the technical constraints and processes in place to support operational security. Some of the applications that we will study include databases, network security, cloud computing, machine learning, autonomous vehicles, and blockchain.


Topics Covered:

Security Fundamentals, Network Security, Computer Network Security Fundamentals, Security Threats and Vulnerabilities, Dealing with Network Security Challenges, Cloud Security, Cloud Computing, Homomorphic Encryption, Differential Privacy, End-toEnd Security Security in IoT/cyber-physical systems, Introduction to IoT/CPS, Hardware Security for IoT (Intel), Drones and Autonomous Vehicles, Blockchain and Quantum Cryptography, Introduction to Quantum Cryptography, Introduction to Blockchain, Blockchain Application for IoT, Blockchain Applications for Agriculture


First two courses in the Design for Security Badge program

Applied / Theory:

50 / 50

Web Address:


Guide to Computer Network Security Book by Joseph Migga Kizza, 3rd Edition, 2015, Springer. Cyber-Physical Systems Security A Survey by Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo, IEEE IoT Journal, 2017. Altawy R, Youssef AM. Security, privacy, and safety aspects of civilian drones: A survey. ACM Transactions on Cyber-Physical Systems. 2017 Feb 20;1(2):7. Blockchain Basics - A Non-Technical Introduction in 25 Steps - Springer

Computer Requirements:

ProEd Minimum Requirements: