Professional Design for Security Certificate Programs
Open to all STEM disciplines, but designed specifically for technical professionals, working engineers, and students with an awareness of secure design, this digital badge program includes multiple online courses to deal with the complexities of designing and manufacturing components and products that will be delivered and integrated into secure customer solutions. These courses will allow individuals to benefit by gaining advanced knowledge that could be applied immediately to their current roles, projects, and initiatives where they could incorporate security from the onset while learning occurs in a flexible online environment.
Register here:
Registration is available for professional students to start courses on the below dates. Individual courses can be registered below.
Four Foundational Courses |
CEUs | Course Opens | Last Day to Register | Course Closes |
| Secure Design Lifecycle - A critical part of all stages of the design process is embracing the mindset that security is not an afterthought. This course covers the integration of security in the design lifecycle, helping develop the security first mindset. | 1.5 | Monday, April 1, 2019 | Sunday, May 5, 2019 | Sunday, June 9, 2019 |
| Foundations of Secure Design - Comprehend basic security concepts and secure design principles and be able to relate the security fundamentals with real-world software and hardware design practices. Outline how security is measured and be able to choose security tools for different scenarios. Distinguish Authentication, Authorization, and Auditing (AAA) concepts and can apply various AAA techniques in given scenarios. Explain how cryptography is used to protect data security and articulate best practices when applying cryptography. Recognize different federal security standards and apply secure design principles to meet compliance requirements. | 1.5 | Monday, July 8, 2019 | Sunday, August 11, 2019 | Sunday, September 15, 2019 |
| Secure Applications - This course introduces different example applications to illustrate the secure design principles from the physical secure design of the infrastructure, to the security of the hardware and software that underlie the infrastructure, and then to the technical constraints and processes in place to support operational security. Some of the applications that we will study include databases, network security, cloud computing, machine learning, autonomous vehicles, and block chain. | 1.5 | Tuesday, October 1, 2019 | Monday, November 4, 2019 | Monday, January 13, 2020 |
| Secure Operations - This course will provide you with a better understanding of how security principles should be integrated into operations once an application or cyber system has been deployed into production. To begin, we will provide an overview of the cyber threat landscape and discuss general frameworks for conceptualizing intrusions and defenses. Topics include both proactive (e.g., monitoring, patching) and reactive (e.g., incident response) processes, as well as approaches to end-of-life processes such as decommissioning and disposal. As part of the course, you will also learn about the current legislative and regulatory environment within which production systems operate, such as laws governing data privacy and security controls. While we focus primarily on the United States, companies increasingly operate across national boundaries, so we will also discuss relevant international regulations, directives, and agreements. Finally, we will examine risk assessment and risk management as a framework for navigating the economic trade-offs associated with securing operations. | 1.5 | Monday, January 6, 2020 | Sunday, February 9, 2020 | Sunday, April 19, 2020 |
Certification and Course Costs
| Single course | $1,302 |
| All four foundational courses | $4,687 |
If you have any further questions concerning the Design for Security program please email securedesign@purdue.edu.